Covert Database and Covert Channels - A Brief Review
Journal:
GRENZE International Journal of Engineering and Technology
Authors:
Dhiraj D. Shirbhate, Sunil R. Gupta
Volume:
10
Issue:
1
Grenze ID:
01.GIJET.10.1.168
Pages:
2567-2573
Abstract
Covert Database and Covert Channels can be represented regarding intriguing facet
of information security, which had the confidential data within seemingly innocuous data
structures. This review paper gives a quite comprehensive idea of Covert Databases and Covert
Channels, providing a detailed analysis of its concepts, mechanisms, detection techniques and
applications [1]. The initial section of this review paper dives into the theoretical concepts of
Covert Databases and Covert Channels, its core principles and terminologies and historical
context. It describes how the Covert Databases have developed over the time, from previous
analogue communication methods to the modern era. Here we have described the difference
between normal and covert databases. The next section describes Covert Databases and Covert
Channels, explaining how sensitive data can be included within seemingly benign data warehouse
it brings light on topics like steganography, data hiding techniques and the challenges related
with covert database detection. We also examined the inspiration behind the utilization of covert
channels and databases highlighting their different uses in various fields, including cyber
warfare, industrial espionage and intelligence operation. It also describes the risks related with
these Covert Communication Methods and the potential risks for individuals and organisations.
Identification is a crucial perspective of Covert Channel and Database Research. This review
paper gives an overview of already existing identification techniques and overcoming measures,
including statistical analysis, intrusion detection systems and AI based approaches. In conclusion,
this comprehensive review paper influences as a precious resource for researches, security
professionals and policy methods searching to understand the concepts of Covert Database and
Covert Channels. Proposed system will be published in upcoming papers with flowcharts and use
cases along with results and discussion. We will be using port scanning method in a new way to
improve the detection of covert database and covert channels