Review Article

A Survey of Key Technologies for Constructing Network Covert Channel

Table 1

The abbreviations used in our article.

AbbreviationFull name

SSLSecure sockets layer
TorThe second-generation onion router
DPIDeep packet inspection
I2PInvisible internet project
MLMachine learning
DLDeep learning
CTCsCovert timing channels
CSCsCovert storage channels
URLUniform resource locator
E2MEnd-to-middle
C&CCommand and control
IPDsInternet packet delays
BERBit error rate
PDUProtocol data unit
ICMPInternet control message protocol
ECDHElliptic curve Diffie-Hellman
TCP ISNsTCP initial sequence numbers
PPTPPoint-to-point tunneling protocol
L2TPLayer two-tunneling protocol
VTPVLAN trunking protocol
IPSecIP security
DHTDistributed hash table
ESPEncapsulating security payload
SDNSoftware defined network
IoTInternet of things
ICSIndustrial control systems
DGADomain generation algorithm