Review Article

A Survey of Key Technologies for Constructing Network Covert Channel

Figure 1

The prisoner model for network covert channel. Alice and Bob are the two communication parties. They encode the covert message into the covert channel, and Wendy is the observer, monitoring and analyzing the communication traffic between them.