Title :
Searching covert channels by identifying malicious subjects in the time domain
Author :
Wang, Changda ; Ju, Shiguang
Author_Institution :
Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., China
Abstract :
Covert channel has three basic elements, i.e. sender subject, receiver subject and medium object. If the sender and receiver subjects change the medium object while they are communicating, though the sender and receiver are the origin, the security kernel will look them as different covert channels. By this method, covert communications between sender and receiver subjects can avoid being suppressed for covert channels of less than 100 bits per second are usually considered acceptable. Regardless the medium object´s influence, a new search method was presented to overcome that vulnerability by identifying the malicious subjects in time domain.
Keywords :
computer networks; security of data; telecommunication security; time-varying channels; covert channel; covert communication; data security; malicious subject identification; time domain; Bit rate; Communication system security; Computer science; Computer security; Information security; Inspection; Kernel; Search methods; Time sharing computer systems; Timing;
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
DOI :
10.1109/IAW.2004.1437799