Title :
Entropy based taxonomy of network convert channels
Author :
Zhiyong, Cai ; Yong, Zhang
Author_Institution :
Coll. of Comput. Sci., Zhejiang Univ., Hangzhou, China
Abstract :
In this paper, we examine general mechanisms that a network covert channel may exploit, and we characterize the essence of network covert channels, which are decided by overt sources. So we present a taxonomy of network covert channels based on entropy of overt sources. We classify overt sources into three categories, as variety entropy, constrant entropy and fixed entropy sources, and name the network covert channels correspondingly. For each category we give the definition, meaning, and countermeasure method. Then we group classical network covert channels emerged in 30 years and representational network covert channels proposed in recent 3 years into our taxonomy framework.
Keywords :
entropy; security of data; telecommunication channels; constrant entropy; fixed entropy; network covert channel; variety entropy; Data security; Entropy; Information security; Intelligent networks; Intelligent transportation systems; Open systems; Power electronics; Steganography; Taxonomy; Timing; network covert channel; network security; taxonomy;
Conference_Titel :
Power Electronics and Intelligent Transportation System (PEITS), 2009 2nd International Conference on
Conference_Location :
Shenzhen
Print_ISBN :
978-1-4244-4544-8
DOI :
10.1109/PEITS.2009.5406973