Covert Database and Covert Channels - A Brief Review

Journal: GRENZE International Journal of Engineering and Technology
Authors: Dhiraj D. Shirbhate, Sunil R. Gupta
Volume: 10 Issue: 1
Grenze ID: 01.GIJET.10.1.168 Pages: 2567-2573

Abstract

Covert Database and Covert Channels can be represented regarding intriguing facet of information security, which had the confidential data within seemingly innocuous data structures. This review paper gives a quite comprehensive idea of Covert Databases and Covert Channels, providing a detailed analysis of its concepts, mechanisms, detection techniques and applications [1]. The initial section of this review paper dives into the theoretical concepts of Covert Databases and Covert Channels, its core principles and terminologies and historical context. It describes how the Covert Databases have developed over the time, from previous analogue communication methods to the modern era. Here we have described the difference between normal and covert databases. The next section describes Covert Databases and Covert Channels, explaining how sensitive data can be included within seemingly benign data warehouse it brings light on topics like steganography, data hiding techniques and the challenges related with covert database detection. We also examined the inspiration behind the utilization of covert channels and databases highlighting their different uses in various fields, including cyber warfare, industrial espionage and intelligence operation. It also describes the risks related with these Covert Communication Methods and the potential risks for individuals and organisations. Identification is a crucial perspective of Covert Channel and Database Research. This review paper gives an overview of already existing identification techniques and overcoming measures, including statistical analysis, intrusion detection systems and AI based approaches. In conclusion, this comprehensive review paper influences as a precious resource for researches, security professionals and policy methods searching to understand the concepts of Covert Database and Covert Channels. Proposed system will be published in upcoming papers with flowcharts and use cases along with results and discussion. We will be using port scanning method in a new way to improve the detection of covert database and covert channels

Download Now << BACK

GIJET