13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Z. Kwecka, BSc (Hons) Network Computing, 2006 618 ReferencesBauer, M. 2003. New covert channels in HTTP: adding unwitting Web browsers to anonymity sets. InProceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. New York: ACMPress.Borders, K., & Prakash, A. 2004. Web tap: detecting covert web traffic. In Proceedings of the 11thACM Conference on Computer <strong>and</strong> Communications Security. New York: ACM Press.<strong>Buchanan</strong>, W. & Llamas, D. June 2004. <strong>Covert</strong> <strong>Channel</strong> <strong>Analysis</strong> <strong>and</strong> Detection with Reverse ProxyServers using Microsoft Windows. The 3rd European Conference on Information Warfare <strong>and</strong>Security. University of London.<strong>Buchanan</strong>, W. 2006, Unit 9 – Data Hiding, URL:www.dcs.napier.ac.uk/~bill/asmn/unit04_forensic_computing.pdf [28 April 2006]Castro, S. November 2003. <strong>Covert</strong> <strong>Channel</strong> <strong>and</strong> Tunneling Over the HTTP Protocol Detection, GWImplementation Theoretical Design. URL: http://www.grayworld.net/projects/papers/html/cctde.html[21 December 2005]Coll, S. August 2005. Terrorists Turn to the Web as Base of Operations - Computer Crime ResearchCenter. URL: http://www.crime-research.org/articles/Terrorists_Turn/ [20 Novembr 2005]de Vivo, M., de Vivo, G. O., & Isern, G. 1998. ACM SIGOPS Operating Systems Review, Internetsecurity attacks at the basic levels, 32/2, 4-15. New York: ACM Press.Dyatlov, A., & Castro, S. June 2003. Exploitation of Data Streams Authorized by a Network AccessControl System for Arbitrary Data Transfers, Tunnelling <strong>and</strong> <strong>Covert</strong> <strong>Channel</strong>s Over the HTTPProtocol. URL: http://www.gray-world.net/projects/papers/covert_paper.txt [14 November 2005]Elz, R., & Bush, R. July 1997. RFC2181, Clarifications to the DNS Specification. URL:http://www.ietf.org/rfc/rfc2181.txt [20 November 2005]Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., & Berners-Lee, T. June 1999.RFC2616, Hypertext Transfer Protocol - HTTP/1.1. URL:http://www.w3.org/Protocols/rfc2616/rfc2616.html [16 November 2005]Forte, D. V. November 2005. SecSyslog: an Approach to Secure Logging Based on <strong>Covert</strong> <strong>Channel</strong>s.URL: http://www.dti.unimi.it/~honeynet/honeynet.it/doc/SecSyslog.pdf [21 December 2005]Gligor, V. D. November 1993, A Guide to underst<strong>and</strong>ing <strong>Covert</strong> <strong>Channel</strong> <strong>Analysis</strong> of Trusted Systems.Technical Report NCSC-TG-030. Meade, Maryl<strong>and</strong>: National Computer Security Centre.Gligor, V. D. November 1993. A Guide to Underst<strong>and</strong>ing <strong>Covert</strong> <strong>Channel</strong> <strong>Analysis</strong> of TrustedSystems. URL: http://www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-030.html [12 November2005]Internet World Stats, December 2005. INTERNET USAGE STATISTICS, The Big Picture, WorldInternet Users <strong>and</strong> Population Stats, URL: http://www.internetworldstats.com/stats.htm [28February 2006]JEM (Joint Experts Meeting). September 2000. Report to the Federal Communications Commission onSurveillance of Packet-Mode Technologies URL:http://www.tiaonline.org/policy/filings/JEM_Rpt_Final_092900.pdf [20 November 2005]Kaminsky, D. December 2004. Black Ops of DNS. URL: http://www.doxpara.com/dns_bh [21December 2005]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!