• DocumentCode
    3307948
  • Title

    Searching covert channels by identifying malicious subjects in the time domain

  • Author

    Wang, Changda ; Ju, Shiguang

  • Author_Institution
    Sch. of Comput. Sci. & Telecommun. Eng., Jiangsu Univ., China
  • fYear
    2004
  • fDate
    10-11 June 2004
  • Firstpage
    68
  • Lastpage
    73
  • Abstract
    Covert channel has three basic elements, i.e. sender subject, receiver subject and medium object. If the sender and receiver subjects change the medium object while they are communicating, though the sender and receiver are the origin, the security kernel will look them as different covert channels. By this method, covert communications between sender and receiver subjects can avoid being suppressed for covert channels of less than 100 bits per second are usually considered acceptable. Regardless the medium object´s influence, a new search method was presented to overcome that vulnerability by identifying the malicious subjects in time domain.
  • Keywords
    computer networks; security of data; telecommunication security; time-varying channels; covert channel; covert communication; data security; malicious subject identification; time domain; Bit rate; Communication system security; Computer science; Computer security; Information security; Inspection; Kernel; Search methods; Time sharing computer systems; Timing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
  • Print_ISBN
    0-7803-8572-1
  • Type

    conf

  • DOI
    10.1109/IAW.2004.1437799
  • Filename
    1437799