Construction of the Covert Channels
نویسندگان
چکیده
The purpose of this work is the demonstration of an adversary intrusion into protected computing system, when the covert channels are poorly taken into account. We consider an opportunity of overcoming the protection mechanisms placed between a protected segment of a local area network and a global network (for example, Internet). We discuss the ability for a warden to reveal the covert channels.
منابع مشابه
طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندیدار در شبکه اینترنت
Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...
متن کاملA Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کاملCovert Channels and Anonymous Communication in Ad Hoc Networks
Title of dissertation: COVERT CHANNELS AND ANONYMOUS COMMUNICATION IN AD HOC NETWORKS Song Li Doctor of Philosophy, 2007 Dissertation directed by: Professor Anthony Ephremides Department of Electrical and Computer Engineering Ad-hoc wireless networks distinguish themselves from their traditional wired counterparts by three unique characteristics: mobility, lack of infrastructure, and shared wir...
متن کاملRunning head: STEGANOGRAPHY IN THAI TEXT
Steganography, or communication through covert channels, is desirable when the mere existence of an encrypted message might cause suspicion or provide useful information to eavesdroppers. Text is effective for steganography due to its ubiquity. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. We propose a novel steganographic embedd...
متن کاملMorphological analysis of Mahabad river channeland the impact of Dam construction
The subject of the study is to analysis pattern of Mahabad River channel. This area is located on the south of Uromia Lake. Rapid changing of its channels pattern is an important characteristics which the evaluation of these characteristics is necessary to any hmplementation of development projects. For this purpose, the morphological changes of river channel were recognized by the areal photog...
متن کامل