{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T07:39:06Z","timestamp":1757576346930,"version":"3.37.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_8","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"85-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Covert Communication Model Based on IPv6 Multicast"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6454-6681","authenticated-orcid":false,"given":"Yazhou","family":"Kong","sequence":"first","affiliation":[]},{"given":"Liancheng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2720-0240","authenticated-orcid":false,"given":"Zhenxing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"unstructured":"Huang, Y., Li, S.: Network covert communication and its detection technology, pp. 13\u201314, Tsinghua University Press, Beijing (2016)","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Jankowski, B., Mazurczyk, W., Szczypiorski, K.: Information hiding using improper frame padding. In: Telecommunications and Network Strategy and Planning Symposium (NETWORKS), pp. 1\u20136. IEEE (2010)","key":"8_CR2","DOI":"10.1109\/NETWKS.2010.5624901"},{"unstructured":"Anthony, D., et al.: A behavior based covert channel within anti-virus updates. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2012)","key":"8_CR3"},{"unstructured":"Murdoch, S.J.: Covert channel vulnerabilities in anonymity systems. No. UCAM-CL-TR-706. University of Cambridge, Computer Laboratory (2007)","key":"8_CR4"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures","author":"NF Johnson","year":"2001","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, vol. 1. Springer Science & Business Media, New York (2001). https:\/\/doi.org\/10.1007\/978-1-4615-4375-6"},{"unstructured":"Ahsan, K., Kundur, D.: Practical data hiding in TCP\/IP. In: Proceedings Workshop on Multimedia Security at ACM Multimedia, vol. 2. No. 7 (2002)","key":"8_CR6"},{"doi-asserted-by":"crossref","unstructured":"Frikha, L., Trabelsi, Z., Tabbane, S.: Simulation, optimisation and integration of Covert Channels, Intrusion Detection and packet filtering systems. In: Information Infrastructure Symposium, GIIS 2009. Global. IEEE (2009)","key":"8_CR7","DOI":"10.1109\/GIIS.2009.5307102"},{"unstructured":"Allix, P.: Covert channels analysis in TCP\/IP networks. IFIPS School of Engineering, University of Paris-Sud XI, Orsay, France (2007)","key":"8_CR8"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/COMST.2007.4317620","volume":"9","author":"S Zander","year":"2007","unstructured":"Zander, S., Armitage, G., Branch, P.: A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9(3), 44\u201357 (2007)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"6","key":"8_CR10","first-page":"173","volume":"4","author":"RKM Supriyanto","year":"2012","unstructured":"Supriyanto, R.K.M., Ramadass, S.: Review on ipv6 security vulnerability issues and mitigation methods. Int. J. Netw. Secur. Appl. 4(6), 173 (2012)","journal-title":"Int. J. Netw. Secur. Appl."},{"doi-asserted-by":"crossref","unstructured":"Zagar, D., Grgic, K.: IPv6 security threats and possible solutions. In: Automation Congress, WAC 2006. World, pp. 1\u20137. IEEE (2006)","key":"8_CR11","DOI":"10.1109\/WAC.2006.375753"},{"doi-asserted-by":"crossref","unstructured":"Abley, J., Savola, P., Neville-Neil, G.: Deprecation of type 0 routing headers in ipv6. draft-ietf-ipv6-deprecate-rh0-01 (2007)","key":"8_CR12","DOI":"10.17487\/rfc5095"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Information Hiding","author":"TG Handel","year":"1996","unstructured":"Handel, T.G., Sandford, M.T.: Hiding data in the OSI network model. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 23\u201338. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-61996-8_29"},{"unstructured":"Hintz, A.: Covert channels in TCP and IP headers. Presentation at DEFCON 10 (2002)","key":"8_CR14"},{"doi-asserted-by":"crossref","unstructured":"Rowland, C.H.: Covert channels in the TCP\/IP protocol suite. First Monday 2(5), (1997)","key":"8_CR15","DOI":"10.5210\/fm.v2i5.528"},{"unstructured":"Rutkowska, J.: The implementation of passive covert channels in the Linux kernel. In: Chaos Communication Congress, Chaos Computer Club eV (2004)","key":"8_CR16"},{"unstructured":"Tom, D.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998)","key":"8_CR17"},{"issue":"1","key":"8_CR18","first-page":"64","volume":"5","author":"Z Trabelsi","year":"2010","unstructured":"Trabelsi, Z., Jawhar, I.: Covert file transfer protocol based on the IP record route option. J. Inf. Assur. Secur. 5(1), 64\u201373 (2010)","journal-title":"J. Inf. Assur. Secur."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11767831_10","volume-title":"Privacy Enhancing Technologies","author":"NB Lucena","year":"2006","unstructured":"Lucena, N.B., Lewandowski, G., Chapin, S.J.: Covert Channels in IPv6. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 147\u2013166. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767831_10"},{"unstructured":"Plonka, D., Berger, A.: kIP: a Measured Approach to IPv6 Address Anonymization. arXiv preprint arXiv:1707.03900 (2017)","key":"8_CR20"},{"unstructured":"Ryan Giobbi Homepage: Filtering ICMPv6 Using Host-Based Firewalls. https:\/\/www.cert.org\/blogs\/vuls\/2008\/11\/icmpv6_types_and_hostbased_fir.html . Accessed 21 Dec 2017","key":"8_CR21"},{"unstructured":"Graf, T.: Messaging over IPv6 destination options (2003)","key":"8_CR22"},{"key":"8_CR23","volume-title":"IPv6\/ICMPv6 Covert Channels","author":"RP Murphy","year":"2006","unstructured":"Murphy, R.P.: IPv6\/ICMPv6 Covert Channels. Defcon, Las Vegas (2006)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:49:58Z","timestamp":1571874598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}