Protocol Channels
نویسنده
چکیده
Covert channel techniques are used by attackers to transfer data in a way prohibited by the security policy. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a new storage channel technique called protocol channels. A protocol channel switches one of at least two protocols to send a bit combination to a destination. The main goal of a protocol channel is that packets containing covert information look equal to all other packets of the system what makes a protocol channel hard to detect.
منابع مشابه
A Simple Protocol to Communicate Channels over Channels
In this paper we present the communication protocol that we use to implement rst class channels. Ordinary channels allow data communication (like CSP/Occam); rst class channels allow communicating channel ends over a channel. This enables processes to exchange communication capabilities, making the communication graph highly exible. In this paper we present a simple protocol to communicate chan...
متن کاملA Multi-channel MAC Protocol for Ad Hoc Wireless Networks
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that can utilize multiple channels dynamically to improve performance. IEEE 802.11 standard provides multiple channels for use, but its MAC protocol is designed only for a single channel. We can achieve improved throughput with multiple channels because multiple transmissions can take place simultaneously wi...
متن کاملSecure Refinements of Communication Channels
It is a common practice to design a protocol (say Q) assuming some secure channels. Then the secure channels are implemented using any standard protocol, e.g. TLS. In this paper, we study when such a practice is indeed secure. We provide a characterization of both confidential and authenticated channels. As an application, we study several protocols of the literature including TLS and BAC proto...
متن کاملDesign and Implementation of an Active Warden Addressing Protocol Switching Covert Channels
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques occurred which are based on the capability of protocol switching. There are currently no means available to counter these new techniques. In this paper we present the first approach to effectively limit the bandwidth of such covert channels by intro...
متن کاملSecure Pseudonymous Channels
Different kinds of channels can be employed in security protocols and web services as a means of securing the communication. We consider here three basic kinds of channels: authentic, confidential, and secure. We define channels as assumptions, i.e. when the messages of a protocol may be transmitted over such channels. More specifically, we define the Ideal Channel Model, which describes the id...
متن کامل