Construction of the Covert Channels

نویسندگان

  • Alexander A. Grusho
  • Elena E. Timonina
چکیده

The purpose of this work is the demonstration of an adversary intrusion into protected computing system, when the covert channels are poorly taken into account. We consider an opportunity of overcoming the protection mechanisms placed between a protected segment of a local area network and a global network (for example, Internet). We discuss the ability for a warden to reveal the covert channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

A Review on Covert Timing Channels & their Applications

Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...

متن کامل

Covert Channels and Anonymous Communication in Ad Hoc Networks

Title of dissertation: COVERT CHANNELS AND ANONYMOUS COMMUNICATION IN AD HOC NETWORKS Song Li Doctor of Philosophy, 2007 Dissertation directed by: Professor Anthony Ephremides Department of Electrical and Computer Engineering Ad-hoc wireless networks distinguish themselves from their traditional wired counterparts by three unique characteristics: mobility, lack of infrastructure, and shared wir...

متن کامل

Running head: STEGANOGRAPHY IN THAI TEXT

Steganography, or communication through covert channels, is desirable when the mere existence of an encrypted message might cause suspicion or provide useful information to eavesdroppers. Text is effective for steganography due to its ubiquity. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. We propose a novel steganographic embedd...

متن کامل

Morphological analysis of Mahabad river channeland the impact of Dam construction

The subject of the study is to analysis pattern of Mahabad River channel. This area is located on the south of Uromia Lake. Rapid changing of its channels pattern is an important characteristics which the evaluation of these characteristics is necessary to any hmplementation of development projects. For this purpose, the morphological changes of river channel were recognized by the areal photog...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003