Protocol Channels

نویسنده

  • Steffen Wendzel
چکیده

Covert channel techniques are used by attackers to transfer data in a way prohibited by the security policy. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a new storage channel technique called protocol channels. A protocol channel switches one of at least two protocols to send a bit combination to a destination. The main goal of a protocol channel is that packets containing covert information look equal to all other packets of the system what makes a protocol channel hard to detect.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Simple Protocol to Communicate Channels over Channels

In this paper we present the communication protocol that we use to implement rst class channels. Ordinary channels allow data communication (like CSP/Occam); rst class channels allow communicating channel ends over a channel. This enables processes to exchange communication capabilities, making the communication graph highly exible. In this paper we present a simple protocol to communicate chan...

متن کامل

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that can utilize multiple channels dynamically to improve performance. IEEE 802.11 standard provides multiple channels for use, but its MAC protocol is designed only for a single channel. We can achieve improved throughput with multiple channels because multiple transmissions can take place simultaneously wi...

متن کامل

Secure Refinements of Communication Channels

It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC proto...

متن کامل

Design and Implementation of an Active Warden Addressing Protocol Switching Covert Channels

Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques occurred which are based on the capability of protocol switching. There are currently no means available to counter these new techniques. In this paper we present the first approach to effectively limit the bandwidth of such covert channels by intro...

متن کامل

Secure Pseudonymous Channels

Different kinds of channels can be employed in security protocols and web services as a means of securing the communication. We consider here three basic kinds of channels: authentic, confidential, and secure. We define channels as assumptions, i.e. when the messages of a protocol may be transmitted over such channels. More specifically, we define the Ideal Channel Model, which describes the id...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008