DocumentCode :
2589662
Title :
Exploring Covert Channels
Author :
Jaskolka, Jason ; Khedri, Ridha
Author_Institution :
Dept. of Comput. & Software, McMaster Univ., Hamilton, ON, Canada
fYear :
2011
fDate :
4-7 Jan. 2011
Firstpage :
1
Lastpage :
10
Abstract :
Covert channels pose a threat to system security for many reasons. One of the most significant security concerns surrounding the use of covert channels in computer and information systems involves confidentiality and the ability to leak confidential information from a high level security user to a low level one covertly. There are many differing views surrounding the ideas of covert channels and steganography with debates igniting over the existence of a relationship between the two concepts. This debate can be resolved with a model to provide a perception of covert channel communication to yield a better understanding of covert channels. In this paper, we propose a model to perceive covert channel communication. We use the proposed model to explore the relationship between covert channels, steganography and watermarking. The intent is to provide a better understanding of covert channel communication in an attempt to develop investigative support for confidentiality.
Keywords :
information systems; security of data; steganography; confidential information; confidentiality; covert channel communication; covert channels; high level security user; information systems; security concerns; steganography; system security; watermarking; Computers; IP networks; Internet; Organizations; Portable document format; Protocols; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
System Sciences (HICSS), 2011 44th Hawaii International Conference on
Conference_Location :
Kauai, HI
ISSN :
1530-1605
Print_ISBN :
978-1-4244-9618-1
Type :
conf
DOI :
10.1109/HICSS.2011.201
Filename :
5718510
Link To Document :
بازگشت