Due to the widespread adoption of the internet and its services, protocols have been established and new ones arise every year. Either for securing connections, ciphering information or service authentication, protocols place an important part in network communications. The TCP/IP has become one of the ubiquitous protocol suites for secure communication, and therefore, a desirable target for covert information encapsulation. In this article, we will discuss the art of unauthorized data transfer - covert techniques - for data encapsulation in protocol data packets, emphasizing headers fields manipulation.
Template for MIEIC's MSc thesis and thesis preparations projects.
Made by João Correia Lopes (jcl) https://web.fe.up.pt/~jlopes/doku.php/teach/feupteses
FEUP's thesis format used in several degrees:
Master in Electrical and Computer Engineering (M.EEC)
Master in Informatics and Computing Engineering (M.IEC)
Master in Information Science (MCI)
Master in Mechanical Engineering (M.EM)
Master in Software Engineering (MESW)
https://web.fe.up.pt/~jlopes/doku.php/doc/teach/feupteses