The Technique to Prevent the Data Leakage using Covert Channels
The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2013-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/296 |
_version_ | 1797762049119354880 |
---|---|
author | Anna Vasilievna Arkhangelskaya Konstantin Grigorievich Kogos |
author_facet | Anna Vasilievna Arkhangelskaya Konstantin Grigorievich Kogos |
author_sort | Anna Vasilievna Arkhangelskaya |
collection | DOAJ |
description | The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated. |
first_indexed | 2024-03-12T19:22:43Z |
format | Article |
id | doaj.art-5802a2e5a5414f169540e534a61a630e |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T19:22:43Z |
publishDate | 2013-12-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-5802a2e5a5414f169540e534a61a630e2023-08-02T05:03:41ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-12-012041020288The Technique to Prevent the Data Leakage using Covert ChannelsAnna Vasilievna Arkhangelskaya0Konstantin Grigorievich Kogos1National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated.https://bit.mephi.ru/index.php/bit/article/view/296covert channelcovert channel identificationcovert channel eliminationcovert channel detectiondata throughputaudit |
spellingShingle | Anna Vasilievna Arkhangelskaya Konstantin Grigorievich Kogos The Technique to Prevent the Data Leakage using Covert Channels Безопасность информационных технологий covert channel covert channel identification covert channel elimination covert channel detection data throughput audit |
title | The Technique to Prevent the Data Leakage using Covert Channels |
title_full | The Technique to Prevent the Data Leakage using Covert Channels |
title_fullStr | The Technique to Prevent the Data Leakage using Covert Channels |
title_full_unstemmed | The Technique to Prevent the Data Leakage using Covert Channels |
title_short | The Technique to Prevent the Data Leakage using Covert Channels |
title_sort | technique to prevent the data leakage using covert channels |
topic | covert channel covert channel identification covert channel elimination covert channel detection data throughput audit |
url | https://bit.mephi.ru/index.php/bit/article/view/296 |
work_keys_str_mv | AT annavasilievnaarkhangelskaya thetechniquetopreventthedataleakageusingcovertchannels AT konstantingrigorievichkogos thetechniquetopreventthedataleakageusingcovertchannels AT annavasilievnaarkhangelskaya techniquetopreventthedataleakageusingcovertchannels AT konstantingrigorievichkogos techniquetopreventthedataleakageusingcovertchannels |