Information Science and Applications (ICISA) 2016. Epishkina, A., Finoshin, M., & Kogos, K. Lecture Notes in Electrical Engineering, 376:641-650, 2016.
Information Science and Applications (ICISA) 2016 [link]Website  abstract   bibtex   
Almost all modern computer networks are based on TCP/IP protocol suite. However, structure features of IP allow constructing covert channels with high capacity using modification of inter-packets delays, packets’ header fields and packets lengths. A technique to eliminate such channels is traffic normalization which means sending packets with equal lengths and fixed header fields with equal inter-packets delays that leads to significant decreasing of efficient communication channels capacity and missing of functional capabilities of network protocols. Another way to counteract covert channel is to detect an active channel. Nevertheless, an attacker can reduce the covert channel capacity purposely to make it undetectable. We investigate on/off covert channel and give recommendations to choose the parameters of ε-similarity detection method with specified threshold values of covert channels capacity.
@article{
 title = {Information Science and Applications (ICISA) 2016},
 type = {article},
 year = {2016},
 identifiers = {[object Object]},
 keywords = {Capacity,Dummy packet,Network covert channels,Packet length,Transfer rate,ε-similarity},
 pages = {641-650},
 volume = {376},
 websites = {http://www.scopus.com/inward/record.url?eid=2-s2.0-84959162811&partnerID=tZOtx3y1},
 id = {02e1f814-9854-319e-b866-0c06fdb8b584},
 created = {2020-02-05T01:22:59.498Z},
 accessed = {2020-02-04},
 file_attached = {false},
 profile_id = {66be748e-b1e3-36e1-95e1-5830d0ccc3ca},
 group_id = {ed1fa25d-c56b-3067-962d-9d08ff49394c},
 last_modified = {2020-02-05T01:22:59.864Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {false},
 hidden = {false},
 folder_uuids = {c2955262-615e-4e71-ba11-ca23b3748d20},
 private_publication = {false},
 abstract = {Almost all modern computer networks are based on TCP/IP protocol suite. However, structure features of IP allow constructing covert channels with high capacity using modification of inter-packets delays, packets’ header fields and packets lengths. A technique to eliminate such channels is traffic normalization which means sending packets with equal lengths and fixed header fields with equal inter-packets delays that leads to significant decreasing of efficient communication channels capacity and missing of functional capabilities of network protocols. Another way to counteract covert channel is to detect an active channel. Nevertheless, an attacker can reduce the covert channel capacity purposely to make it undetectable. We investigate on/off covert channel and give recommendations to choose the parameters of ε-similarity detection method with specified threshold values of covert channels capacity.},
 bibtype = {article},
 author = {Epishkina, Anna and Finoshin, Mikhail and Kogos, Konstantin},
 journal = {Lecture Notes in Electrical Engineering}
}

Downloads: 0