Study performance indicators covert channels of steganographic systems in telecommunication networks
نویسندگان
چکیده
Composite performance indicators of steganographic systems are investigated, on the basis which a new approach to construction covert channel models in telecommunication communication networks is proposed. Analytical expressions obtained for estimating maximum value bandwidth when introducing counteraction method and changing packet lengths, allow determining characteristics data hiding system.
منابع مشابه
CoChaT Covert Channels in Timed Systems
Serge Haddad was professor at Université Paris-Dauphine when I obtained a position of professor there in september 2004. We did some research work together from this time on, and this cooperation went on after our respective position changes : in Ecole Normale Supérieure de Cachan (feb. 2008) for S. Haddad and in Université Pierre et Marie Curie (sept. 2008) for me. More precisely, a first step...
متن کاملSteganographic Communication in Ordered Channels
In this paper we focus on estimating the amount of information that can be embedded in the sequencing of packets in ordered channels. Ordered channels, e.g. TCP, rely on sequence numbers to recover from packet loss and packet reordering. We propose a formal model for transmitting information by packet-reordering. We present natural and well-motivated channel models and jamming models including ...
متن کاملSteganographic Timing Channels
This paper describes steganographic timing channels that use cryptographic primitives to hide the presence of covert channels in the timing of network traffic. We have identified two key properties for steganographic timing channels: (1) the parameters of the scheme should be cryptographically keyed, and (2) the distribution of input timings should be indistinguishable from output timings. Thes...
متن کاملCovert Channels | Here to Stay? Covert Channels | Here to Stay?
We discuss the di culties of satisfying high-assurance system requirements without sacri cing system capabilities. To alleviate this problem, we show how trade-o s can be made to reduce the threat of covert channels. We also clarify certain concepts in the theory of covert channels. Traditionally, a covert channel's vulnerability was measured by the capacity. We show why a capacity analysis alo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatics and control problems
سال: 2023
ISSN: ['2664-2085']
DOI: https://doi.org/10.54381/icp.2023.1.03