The Technique to Prevent the Data Leakage using Covert Channels

The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been...

Full description

Bibliographic Details
Main Authors: Anna Vasilievna Arkhangelskaya, Konstantin Grigorievich Kogos
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/296
_version_ 1797762049119354880
author Anna Vasilievna Arkhangelskaya
Konstantin Grigorievich Kogos
author_facet Anna Vasilievna Arkhangelskaya
Konstantin Grigorievich Kogos
author_sort Anna Vasilievna Arkhangelskaya
collection DOAJ
description The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated.
first_indexed 2024-03-12T19:22:43Z
format Article
id doaj.art-5802a2e5a5414f169540e534a61a630e
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T19:22:43Z
publishDate 2013-12-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-5802a2e5a5414f169540e534a61a630e2023-08-02T05:03:41ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-12-012041020288The Technique to Prevent the Data Leakage using Covert ChannelsAnna Vasilievna Arkhangelskaya0Konstantin Grigorievich Kogos1National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated.https://bit.mephi.ru/index.php/bit/article/view/296covert channelcovert channel identificationcovert channel eliminationcovert channel detectiondata throughputaudit
spellingShingle Anna Vasilievna Arkhangelskaya
Konstantin Grigorievich Kogos
The Technique to Prevent the Data Leakage using Covert Channels
Безопасность информационных технологий
covert channel
covert channel identification
covert channel elimination
covert channel detection
data throughput
audit
title The Technique to Prevent the Data Leakage using Covert Channels
title_full The Technique to Prevent the Data Leakage using Covert Channels
title_fullStr The Technique to Prevent the Data Leakage using Covert Channels
title_full_unstemmed The Technique to Prevent the Data Leakage using Covert Channels
title_short The Technique to Prevent the Data Leakage using Covert Channels
title_sort technique to prevent the data leakage using covert channels
topic covert channel
covert channel identification
covert channel elimination
covert channel detection
data throughput
audit
url https://bit.mephi.ru/index.php/bit/article/view/296
work_keys_str_mv AT annavasilievnaarkhangelskaya thetechniquetopreventthedataleakageusingcovertchannels
AT konstantingrigorievichkogos thetechniquetopreventthedataleakageusingcovertchannels
AT annavasilievnaarkhangelskaya techniquetopreventthedataleakageusingcovertchannels
AT konstantingrigorievichkogos techniquetopreventthedataleakageusingcovertchannels