Lamshöft et al. - Google Patents
2 Related Work and Technical BackgroundLamshöft et al.
View HTML- Document ID
- 14293365767715537560
- Author
- Lamshöft K
- Hielscher J
- Krätzer C
- Dittmann J
External Links
Snippet
The discovery and evaluation of covert channels in network protocols and corresponding countermeasures is often focused on one, or few specific channels. Different approaches were summarized by Zander et al.[53]. Larger, systematic approaches are rare: Murdoch et …
- 238000004458 analytical method 0 abstract description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W56/00—Synchronization arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mizrahi | Security requirements of time protocols in packet switched networks | |
Vanhoef et al. | Predicting, Decrypting, and Abusing {WPA2/802.11} Group Keys | |
Kotuliak et al. | {LTrack}: Stealthy tracking of mobile phones in {LTE} | |
Alghamdi et al. | Precision time protocol attack strategies and their resistance to existing security extensions | |
Abanto-Leon et al. | Stay connected, leave no trace: Enhancing security and privacy in wifi via obfuscating radiometric fingerprints | |
Hielscher et al. | A systematic analysis of covert channels in the network time protocol | |
Spanghero et al. | Authenticated time for detecting GNSS attacks | |
Rios et al. | Covert communications through network configuration messages | |
Schmidbauer et al. | Sok: A survey of indirect network-level covert channels | |
Alghamdi et al. | Advanced methodologies to deter internal attacks in PTP time synchronization networks | |
Tripathi et al. | Preventing time synchronization in NTP broadcast mode | |
Schmidbauer et al. | Covert storage caches using the NTP protocol | |
US10812506B2 (en) | Method of enciphered traffic inspection with trapdoors provided | |
O’driscol et al. | A performance assessment of secure wireless two-way time transfer | |
Shimizu et al. | WhiteRabbit: Scalable software-defined network data-plane verification method through time scheduling | |
Heda et al. | Covert channel design and detection techniques: a survey | |
Lamshöft et al. | 2 Related Work and Technical Background | |
WO2023078106A1 (en) | Access control method, apparatus and system for encrypted traffic | |
He et al. | Study of network time synchronisation security strategy based on polar coding | |
Moura et al. | Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios | |
Mizrahi | RFC 7384: Security requirements of time protocols in packet switched networks | |
Abarca | An analysis of network steganographic malware | |
Park et al. | Invi-server: Reducing the attack surfaces by making protected server invisible on networks | |
Cao et al. | Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts | |
Luo et al. | Crafting web counters into covert channels |