In most covert channel systems, bandwidth is sacrificed for covertness. By using a dynamic, broad spectrum approach it was possible to use multiple covert channels to create a larger pipeline for data transmission. This approach utilized a monitor to determine how much data the network would be able to support before suspicion would be drawn to the change in traffic utility. The system then dispersed this traffic to each protocol proportionately using their monitored utility as a guide. A feedback channel was also utilized to determine if channel transmissions were successful and disabled any channels for future use that the network security blocked. In this way, a robust channel system was created that also increased bandwidth of communication.
Library of Congress Subject Headings
Computer networks--Security measures; Cryptography
Computing Security (MS)
Department, Program, or Center
Department of Computing Security (GCCIS)
Hoffman, Christopher, "A Dynamic, Broad Spectrum Approach to Covert Channels" (2013). Thesis. Rochester Institute of Technology. Accessed from
RIT – Main Campus