A Protocol Independent Approach in Network Covert Channel Detection.
Md. Ahsan AyubSteven SmithAmbareen SirajPublished in: CSE/EUC (2019)
Keyphrases
- covert channel
- network traffic
- network simulator
- security requirements
- network protocols
- communication protocol
- tcp ip
- anomaly detection
- network model
- complex networks
- computer networks
- communication networks
- internet protocol
- virtual private network
- software engineering
- network devices
- ip networks
- mobile nodes
- network management