The Technique to Prevent the Data Leakage using Covert Channels
The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been...
Main Authors: | Anna Vasilievna Arkhangelskaya, Konstantin Grigorievich Kogos |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2013-12-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/296 |
Similar Items
-
Detection of IP Covert Timing Channels
by: Konstantin Grigorievich Kogos, et al.
Published: (2015-03-01) -
The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
by: Anna Igorevna Belozubova, et al.
Published: (2015-10-01) -
On the Limitation of Covert Channels Bandwidth in IP Networks
by: Anna Igorevna Belozubova, et al.
Published: (2015-03-01) -
Covert Channel Detection: Machine Learning Approaches
by: Muawia A. Elsadig, et al.
Published: (2022-01-01) -
A Blockchain-Enabled Group Covert Channel against Transaction Forgery
by: Tongzhou Shen, et al.
Published: (2024-01-01)