Covert Channel Detection and Generation Techniques: A Survey

Ammar T. Zahary,Nesmah A. Al-Khulaidi,Muneer A. S Hazaa,Adel A. Nasser
DOI: https://doi.org/10.1109/eSmarTA59349.2023.10293582
2023-10-10
Abstract:The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert channel use is still in its early phases, even though information security concerns are growing as a result of quick technology advancements. As a result, several problems and concerns need to be resolved, and the future plan is foggy. This paper seeks to give a thorough comparison of earlier and more recent attempts in this field. It offers a survey of the literature on the drawbacks and gaps in conventional detection techniques, emphasizing the most recent techniques for discovering and creating these covert channels while carefully considering machine learning and deep learning-based detection techniques. Additionally, it broadens the topic to cover the crucial function that these channels play in technology. Timing channels, storage channels, and hybrid channels are just a few of the ways covert channels may be utilized to transfer data. They can be used to get around security measures like intrusion detection systems and firewalls. Additionally, they may be used to steal confidential data from a system, including passwords, credit card numbers, and intellectual property. System security is seriously threatened by covert channels, and more study on covert channel production and detection is required to stay up with the changing threat environment.
Engineering,Computer Science
What problem does this paper attempt to address?