A Sequential Distinguisher for Covert Channel Identification

نویسندگان

  • K. P. Subbalakshmi
  • Rajarathnam Chandramouli
  • N. Ranganathan
چکیده

Covert channels are of two types: (a) timing channel and (b) storage channel. Most previous works have studied these channels from the encoder’s perspective, namely, information theoretic capacity, algorithms and protocols for hiding information etc. This paper investigates the covert channel problem from an passive adversary’s perspective. A sequential distinguisher for storage channel identification by an adversary is proposed and its properties are derived analytically. The impact of correlation in the observations received by the adversary is studied analytically as well as numerically.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

Covert attention enhances letter identification without affecting channel tuning.

Directing covert attention to the target location enhances sensitivity, but it is not clear how this enhancement comes about. Knowing that a single spatial frequency channel mediates letter identification, we use the critical-band-masking paradigm to investigate whether covert attention affects the spatial frequency tuning of that channel. We find that directing attention to the target location...

متن کامل

Covert Channels with Sequential Transducers⋆

Covert channels represent a security problem for information systems, since they permit illegal flows and sometimes leaks of classified data. Although numerous descriptions have been given at a concrete level, relatively few work has been carried out at a more abstract level. In this paper, we propose a definition for covert channels based on encoding and decoding binary messages with transduce...

متن کامل

Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation

* This work is supported by National Natural Science Foundation of China (No. 61073178) and Beijing Natural Science Foundation (No. 4112064). The abridged version of this paper was accepted by Chinese Journal of Electronics on June 20, 2011 after anonymous peer reviews, and will appear in 2012. ♀Corresponding Author(e-mail: [email protected]) Abstract: Construction and evaluation of efficient ...

متن کامل

Probabilistic Identification for Hard to Classify Protocol

With the growing use of protocols obfuscation techniques, protocol identification for Q.O.S enforcement, traffic prohibition, and intrusion detection has became a complex task. This paper address this issue with a probabilistic identification analysis that combines multiples advanced identification techniques and returns an ordered list of probable protocols. It combines a payload analysis with...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007