The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta erro...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2015-10-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/86 |
_version_ | 1797758797881540608 |
---|---|
author | Anna Igorevna Belozubova Konstantin Grigorievich Kogos Mikhail Aleksandrovich Finoshin |
author_facet | Anna Igorevna Belozubova Konstantin Grigorievich Kogos Mikhail Aleksandrovich Finoshin |
author_sort | Anna Igorevna Belozubova |
collection | DOAJ |
description | Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta errors, an ability of implementation. |
first_indexed | 2024-03-12T18:35:19Z |
format | Article |
id | doaj.art-c7192f5bdf5544f299efe93cb20cfa16 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T18:35:19Z |
publishDate | 2015-10-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-c7192f5bdf5544f299efe93cb20cfa162023-08-02T08:04:29ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362015-10-0122386The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP NetworksAnna Igorevna Belozubova0Konstantin Grigorievich Kogos1Mikhail Aleksandrovich Finoshin2National Research Nuclear University MEPhINational Research Nuclear University MEPhINational Research Nuclear University MEPhIKeywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta errors, an ability of implementation.https://bit.mephi.ru/index.php/bit/article/view/86covert channelsstorage channelstiming channelscapacitylimitationeliminationdetection |
spellingShingle | Anna Igorevna Belozubova Konstantin Grigorievich Kogos Mikhail Aleksandrovich Finoshin The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks Безопасность информационных технологий covert channels storage channels timing channels capacity limitation elimination detection |
title | The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks |
title_full | The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks |
title_fullStr | The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks |
title_full_unstemmed | The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks |
title_short | The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks |
title_sort | analysis of existing methods to prevent the data leakage using covert channels in ip networks |
topic | covert channels storage channels timing channels capacity limitation elimination detection |
url | https://bit.mephi.ru/index.php/bit/article/view/86 |
work_keys_str_mv | AT annaigorevnabelozubova theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks AT konstantingrigorievichkogos theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks AT mikhailaleksandrovichfinoshin theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks AT annaigorevnabelozubova analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks AT konstantingrigorievichkogos analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks AT mikhailaleksandrovichfinoshin analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks |