Detection and Defense Mechanisms for Covert Timing communications
DOI:
https://doi.org/10.63278/1435Keywords:
Covert channel detection, Timing channel, Network security, Active warden, Detection methods.Abstract
This study presents a literature overview on methods for discovering and removing covert channels. Data transmission methods known as covert channels take advantage of system resources already in place but weren't intended for this purpose, such as firewalls, to transport data undetected. By setting up a seemingly secure channel of communication between two parties, sensitive information could be leaked from the more secure party to the less secure party. Using a shared network, two parties can easily communicate and exchange information to send confidential data without being detected. As a result, discovering covert communications is difficult. Network protocols place restrictions on Covert Storage Channels (CSC), preventing it from deviating from a set of guidelines. On the other hand, CTCs have stochastic behavior, which makes detection more challenging. Analysis of the state of art systems is done in this paper & it is found that the most likely option is an active warden which is a specialized network security system that is designed to filter out a range of irregularities seen in network data.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2025 Vrushali Uday Uttarwar, Dhananjay M.Dakhane

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their published articles online (e.g., in institutional repositories or on their website, social networks like ResearchGate or Academia), as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Except where otherwise noted, the content on this site is licensed under a Creative Commons Attribution 4.0 International License.