Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 6
Abstract
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert technique which is used in this paper is unique; it uses the IP fields to hide the data. The data can be malignant software or virus that can be communicated via unauthorized channel. This paper focuses on various techniques which are used to hide the information using IP field hiding as the mechanism and also on vulnerabilities of IPV4 & IPsec.
Authors and Affiliations
Rajesh H, Anjan K
Efficient and Flexible Access Control for Outsourced Data In Cloud
This paper presents a scheme achieves scalability and also inherits flexibility and finegrained access control in supporting compound attributes of ASBE . In the other hand HASBE implement multiple value assignments f...
A Novel Symmetric Key Cryptography Algorithm for Improving Privacy of Data in Cloud Servers
In this paper, a cryptography technique, Novel Symmetric Key Cryptography algorithm is used to improve the data security and access control in the environment of Cloud Computing. The users upload the personal data ov...
Incorporating Human Behavioral Patterns in Big Data Text Analytics
One of the modern day emerging technologies include Big Data Analysis. Big Data refers to the huge terabytes of data being collected on internet web sites such as Facebook, Twitter etc, Machine data such as sensors an...
Recognition besides Adjustment of Inaccurate Fingerprints Matching
Biometric distinguishing proof has included noticeably for people with unique mark developing as the prevailing one. The strength of unique mark is been set up by the persistent rise of diverse types of Automated Fin...
Query Clustering method to User profiles
The User profiling is a fundamental component of any personal applications. The several existing user profiling strategies are based on the objects of users are interested in positive references but not negative pref...