DocumentCode
3307948
Title
Searching covert channels by identifying malicious subjects in the time domain
Author
Wang, Changda ; Ju, Shiguang
Author_Institution
Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., China
fYear
2004
fDate
10-11 June 2004
Firstpage
68
Lastpage
73
Abstract
Covert channel has three basic elements, i.e. sender subject, receiver subject and medium object. If the sender and receiver subjects change the medium object while they are communicating, though the sender and receiver are the origin, the security kernel will look them as different covert channels. By this method, covert communications between sender and receiver subjects can avoid being suppressed for covert channels of less than 100 bits per second are usually considered acceptable. Regardless the medium object´s influence, a new search method was presented to overcome that vulnerability by identifying the malicious subjects in time domain.
Keywords
computer networks; security of data; telecommunication security; time-varying channels; covert channel; covert communication; data security; malicious subject identification; time domain; Bit rate; Communication system security; Computer science; Computer security; Information security; Inspection; Kernel; Search methods; Time sharing computer systems; Timing;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN
0-7803-8572-1
Type
conf
DOI
10.1109/IAW.2004.1437799
Filename
1437799
Link To Document