DocumentCode :
3307948
Title :
Searching covert channels by identifying malicious subjects in the time domain
Author :
Wang, Changda ; Ju, Shiguang
Author_Institution :
Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., China
fYear :
2004
fDate :
10-11 June 2004
Firstpage :
68
Lastpage :
73
Abstract :
Covert channel has three basic elements, i.e. sender subject, receiver subject and medium object. If the sender and receiver subjects change the medium object while they are communicating, though the sender and receiver are the origin, the security kernel will look them as different covert channels. By this method, covert communications between sender and receiver subjects can avoid being suppressed for covert channels of less than 100 bits per second are usually considered acceptable. Regardless the medium object´s influence, a new search method was presented to overcome that vulnerability by identifying the malicious subjects in time domain.
Keywords :
computer networks; security of data; telecommunication security; time-varying channels; covert channel; covert communication; data security; malicious subject identification; time domain; Bit rate; Communication system security; Computer science; Computer security; Information security; Inspection; Kernel; Search methods; Time sharing computer systems; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
Type :
conf
DOI :
10.1109/IAW.2004.1437799
Filename :
1437799
Link To Document :
بازگشت