Assignment5 - I, Travis McPeak, pledge that this is my own...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
I, Travis McPeak, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. Travis McPeak November 6 th , 2008 CECS 478 Homework #5 1. A network covert storage channel is a way to secretly transmit information over a network using modification of ordinary network traffic. The modification to the packet may occur either in the packet data section (payload) or the packet header section. If the header is used for the covert channel, many fields are available that are unused and frequently unchecked by firewalls and intrusion detection systems. The way that information is covertly transmitted through the channel typically involves setting a pre-determined location in the packet to either “1” or “0”. 2. A network covert timing channel is a way to secretly transmit information over a network using the coordinated arrival or non-arrival of a packet at a certain pre-agreed frequency. The covert channel may use any network protocol or port for the timing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 2

Assignment5 - I, Travis McPeak, pledge that this is my own...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online