We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.
covert channels, TCP/IP, netwotk steganography.