Covert Channel in the BitTorrent Tracker Protocol

@inproceedings{Desimone2016CovertCI,
  title={Covert Channel in the BitTorrent Tracker Protocol},
  author={Joseph Desimone and Daryl Johnson and Bo Yuan and Peter Lutz},
  year={2016}
}
Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert channels can be used. A botnet should rely on covert channels built on ubiquitous protocols to blend in… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Covert channels in the HTTP network protocol: Channel characterization and detecting manin-the-middle attacks

  • D. Johnson, B. Yuan, P. Lutz, E. Brown
  • 2010. [Online]. Available: https://ritdml.rit.edu…
  • 2010
1 Excerpt

Behavior-based covert channel in cyberspace

  • D. Johnson, B. Yuan, P. Lutz
  • 2009. [Online]. Available: https://ritdml.rit…
  • 2009
1 Excerpt

Internet Study 2008/2009

  • H. Schulze, K. Mochalski
  • 2009. [Online]. Available: http://www.ipoque.com…
  • 2009
1 Excerpt

The BitTorrent Protocol Specification

  • B. Cohen
  • 2008. [Online]. Available: http://www.bittorrent…
  • 2008
1 Excerpt

Similar Papers

Loading similar papers…