Abstract

Currently, due to the development and widespread use of communication systems, information security problems are very acute. Very often information leakage causes huge damage to both organizations and individuals. One of the mechanisms to organize information leakage during its transmission through communication channels is the construction of covert channels. Everywhere used packet networks provide huge opportunities for covert channels creating, which often leads to leakage of critical data. Packet length covert channels are resistant to traffic encryption, but there are some data transfer schemes that are difficult to detect. Therefore investigating of hybrid covert channel that uses both packet length and time is quite important. The purpose of this paper is to suggest a technique to protect data leakage via random increasing of packets’ lengths. The verification of the technique concerns with covert channel capacity examination depending on covert channel input parameters and countermeasure parameters. The authors have chosen the best scheme of a covert channel in terms of a residual covert channel capacity. The construction of covert channel shows that countermeasures applied don’t lead to errors. The main advantage of the scheme investigated is as follows: lengths of the transmitted packets take limited number of values that significantly increases the complexity of building such a channel and the ability to detect it.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.