Construction of the Covert Channels
The purpose of this work is the demonstration of an adversary intrusion into protected computing system, when the covert channels are poorly taken into account. We consider an opportunity of overcoming the protection mechanisms placed between a protected segment of a local area network and a global network (for example, Internet). We discuss the ability for a warden to reveal the covert channels. The work is supported with the grant RFBR # 01-01-00895.
KeywordsLocal Area Network Global Network Grant RFBR Virtual Private Network Source Address
Unable to display preview. Download preview PDF.
- 1.Kolchin, V.F., Sevastianov, B.A., Chistyakov, V.P.: Random accommodations. Science, Moscow (1976)Google Scholar
- 2.Timonina, E.E.: The covert channels (review). Jet Info, pp. 3-11 (November 2002)Google Scholar
- 3.Ahsan, K., Kundur, D.: Practical Data Hiding in TCP/IP. In: Workshop Multimedia and Security at ACM Multimedia 2002, December 6. Juan-les-Pins on the French Riviera (2002)Google Scholar
- 4.A Guide to Understanding Covert Channel Analysis of Trusted Systems. In: National Computer Security Center, NCSC-TG-030, ver. 1 (1993)Google Scholar