{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:50:23Z","timestamp":1755838223840,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/dsn.2011.5958260","type":"proceedings-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T11:17:24Z","timestamp":1311247044000},"page":"474-485","source":"Crossref","is-referenced-by-count":13,"title":["A combinatorial approach to network covert communications with applications in Web Leaks"],"prefix":"10.1109","author":[{"given":"Xiapu","family":"Luo","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Edmond W. W.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Rocky K. C.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Covert channels in IPv6","author":"lucena","year":"2005","journal-title":"Proc PET Workshop"},{"key":"ref38","article-title":"Eliminating steganography in Internet traffic with active wardens","author":"fisk","year":"2002","journal-title":"Proc Inform Hiding"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.2600"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198826"},{"journal-title":"NLANR","article-title":"Web caching project","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_5","article-title":"Pervasive random beacon in the Internet for covert coordination","author":"lee","year":"2005","journal-title":"Proc Inform Hiding"},{"key":"ref37","article-title":"HTTPOS: Sealing information leaks with browser-side obfuscation of encrypted flows","author":"luo","year":"2011","journal-title":"Proc ISOC NDSS"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/11558859_19","article-title":"Embedding covert channels into TCP\/IP","author":"murdoch","year":"2005","journal-title":"Proc Inform Hiding"},{"journal-title":"WIDE data set","year":"0","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/0471739219"},{"key":"ref10","article-title":"Practical data hiding in TCP\/IP","author":"ahsan","year":"2002","journal-title":"Proc ACM Workshop on Multimedia Security"},{"key":"ref40","article-title":"Covert messaging through TCP timestamps","author":"giffen","year":"2002","journal-title":"Proc PET Workshop"},{"key":"ref11","article-title":"Steganographic communication in ordered channels","author":"chakinala","year":"2006","journal-title":"Proc Inform Hiding"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062143"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330133"},{"key":"ref14","article-title":"Cloak: A ten-fold way for reliable covert communications","author":"luo","year":"2007","journal-title":"Proc ESORICS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030100"},{"key":"ref16","article-title":"Glavlit: Preventing exfiltration at wire speed","author":"schear","year":"2006","journal-title":"Proc ACM HotNets"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref18","article-title":"Model-based covert timing channels: Automated modeling and evasion","author":"gianvecchio","year":"2008","journal-title":"Proc RAID"},{"key":"ref19","article-title":"Keyboards and covert channels","author":"shah","year":"2006","journal-title":"Proc Usenix Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.9"},{"key":"ref4","article-title":"Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks","author":"freiling","year":"2005","journal-title":"Proc ESORICS"},{"article-title":"East Side, West Side: An introduction to combinatorial families with Maple programming","year":"2002","author":"wilf","key":"ref27"},{"key":"ref3","article-title":"Covert channels provided hackers the opportunity and the means for the current distributed denial of service attacks","author":"henry","year":"2000","journal-title":"CyberGuard Corporation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005152"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72367-9_29"},{"key":"ref5","article-title":"Infranet: Circumventing censorship and surveillance","author":"feamster","year":"2002","journal-title":"Proc Usenix Security"},{"key":"ref8","article-title":"Detecting covert timing channels: An entropy-based approach","author":"gianvecchio","year":"2007","journal-title":"Proc ACM CCS"},{"key":"ref7","article-title":"Chipping away at censorship with user-generated content","author":"burnett","year":"2010","journal-title":"Proc Usenix Security"},{"journal-title":"NISCC Monthly Bulletin","article-title":"Phishing trojan plays ping-pong with captured data","year":"2006","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00299-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601339"},{"article-title":"Let's expand Rota's twelvefold way for counting partitions","year":"2006","author":"proctor","key":"ref46"},{"key":"ref20","article-title":"TCP covert timing channels: Design and detection","author":"luo","year":"2008","journal-title":"Proc IFIP DSN"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref22","article-title":"Elements of Information Theory","author":"cover","year":"2006","journal-title":"2nd"},{"key":"ref47","article-title":"Port knocking: Network authentication across closed ports","volume":"12","author":"krzywinski","year":"2003","journal-title":"SysAdmin Magazine"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822645"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550357"},{"article-title":"Enumerative Combinatorics","year":"2002","author":"charalambides","key":"ref24"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30114-1_12","article-title":"Syntax and semantics-preserving application-layer protocol steganography","author":"lucena","year":"2004","journal-title":"Proc Inform Hiding"},{"article-title":"A combinatorial approach to network covert communications with applications in web leaks (full version)","year":"2011","author":"luo","key":"ref23"},{"key":"ref44","article-title":"Covert TCP\/IP timing channels: Theory to implementation","author":"sellke","year":"2009","journal-title":"Proc IEEE InfoCom"},{"article-title":"Combinatorial Algorithms: Generation, Enumeration and Search","year":"1998","author":"kreher","key":"ref26"},{"key":"ref43","article-title":"Detection of covert channel encoding in network packet delays","author":"berk","year":"2005","journal-title":"Dartmouth College Technical Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(01)00141-7"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2011,6,27]]},"location":"Hong Kong, China","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE\/IFIP 41st International Conference on Dependable Systems &amp; Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5949577\/5958196\/05958260.pdf?arnumber=5958260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T01:19:12Z","timestamp":1560388752000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5958260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/dsn.2011.5958260","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}