@inproceedings{fb7896a2a417485d90c6d49bb501210f,
title = "Introducing P2P architecture in adaptive covert communication system",
abstract = "Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with {"}national{"} firewalls, citizen profiling and other {"}unethical{"} uses of Information Technology. Current steganographic methods that implement covert channels within network traffic, are highly dependent on particular media data or network protocol to hide data. In this paper we investigate the methods and an algorithm for implementing adaptive covert communication system that works on real-world Internet, capable of using multiple application-level protocols as its communication media and can be implemented as network application, therefore requires no system modifications of communicating nodes. The key difference from previous solutions is the use of adaptive redundant mechanism, which allows real-time underlying protocol switching and adaptation to the dynamic network configuration changes. Further, covert channels can be extended with p2p architecture in order to improve channel ressistance.",
keywords = "Covert-channels, p2p, Self-adaptation and self-organization, Steganography",
author = "Yarochkin, {Fedor V.} and Dai, {Shih Yao} and Lin, {Chih Hung} and Yennun Huang and Kuo, {Sy Yen}",
year = "2009",
doi = "10.1109/AHICI.2009.5340293",
language = "英语",
isbn = "9781424445707",
series = "1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009",
booktitle = "1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009",
note = "1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009 ; Conference date: 03-11-2009 Through 05-11-2009",
}