The research on information hiding based on command sequence of FTP protocol

18Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traditional covert channels study mainly focus on digital signature, operation system and multimedia technology. The covert channels in TCP/IP protocol suite have many advantages, such as they are harder to be detected and more robust. Two covert channels are discovered by using FTP protocol command sequence based on the study of FTP protocol. The principles of covert channels are analyzed. Three characters of covert channels, which are concealment, bandwidth and robustness, are studied. And the methods to construct covert channels are also applicable to other internet protocol. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Zou, X. G., Li, Q., Sun, S. H., & Niu, X. (2005). The research on information hiding based on command sequence of FTP protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3683 LNAI, pp. 1079–1085). Springer Verlag. https://doi.org/10.1007/11553939_151

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free