Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Безопасность информа...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Безопасность информационных технологий
Article . 2021 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 2 versions
addClaim

Prospective approaches to detecting network covert channels

ПЕРСПЕКТИВНЫЕ ПОДХОДЫ К ОБНАРУЖЕНИЮ СЕТЕВЫХ СКРЫТЫХ КАНАЛОВ
Authors: Konstantin G. Kogos; Mihail A. Finoshin;

Prospective approaches to detecting network covert channels

Abstract

The purpose of this study is to analyze the existing timing covert channels detection methods. Preventive measures are often used to counteract storage covert channels, such as traffic encryption and transmitted packets length normalization. Methods, that do not affect the functioning of legitimate communication channels are more preferable in the case of timing covert channels, since preventive measures lead to more tangible consequences for the operation of the entire system. One of the non- preventative measures is detection. The task of detecting covert channels in the protected system is reduced either to the task of searching for patterns in the traffic flow, or to the task of comparing the tested sample with the "reference" one. A "reference" sample is a sample with a guaranteed absence of a functioning covert channel. The machine learning algorithms in the context of the problem of network covert channels detection are discussed. There are three cases of work of methods for detecting network timing covert channels, based on machine learning algorithms. The cases differ depending on the knowledge of the protected system. The general scheme of operation of such methods for three cases is given. The result of the analysis of existing methods is the conclusion about the need to improve them for the most realistic case – the absence of both "reference" traffic and traffic with a guaranteed presence of a covert channel. The described problems show a promising direction in the field of research on methods of countering information leakage through network covert channels.

Keywords

Information theory, covert channels, timing channels, information leakage, detection, machine learning., Information technology, Q350-390, T58.5-58.64

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
1
Average
Average
Average
gold