Abstract

In most covert channel systems, bandwidth is sacrificed for covertness. By using a dynamic, broad spectrum approach it was possible to use multiple covert channels to create a larger pipeline for data transmission. This approach utilized a monitor to determine how much data the network would be able to support before suspicion would be drawn to the change in traffic utility. The system then dispersed this traffic to each protocol proportionately using their monitored utility as a guide. A feedback channel was also utilized to determine if channel transmissions were successful and disabled any channels for future use that the network security blocked. In this way, a robust channel system was created that also increased bandwidth of communication.

Library of Congress Subject Headings

Computer networks--Security measures; Cryptography

Publication Date

12-16-2013

Document Type

Thesis

Student Type

Graduate

Degree Name

Computing Security (MS)

Department, Program, or Center

Department of Computing Security (GCCIS)

Advisor

Daryl

Advisor/Committee Member

Peter Lutz

Advisor/Committee Member

Bo Yuan

Comments

Physical copy available from RIT's Wallace Library at TH5105.59 .H645 2013

Campus

RIT – Main Campus

Plan Codes

COMPSEC-MS

Share

COinS