The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks

Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta erro...

Full description

Bibliographic Details
Main Authors: Anna Igorevna Belozubova, Konstantin Grigorievich Kogos, Mikhail Aleksandrovich Finoshin
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2015-10-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/86
_version_ 1797758797881540608
author Anna Igorevna Belozubova
Konstantin Grigorievich Kogos
Mikhail Aleksandrovich Finoshin
author_facet Anna Igorevna Belozubova
Konstantin Grigorievich Kogos
Mikhail Aleksandrovich Finoshin
author_sort Anna Igorevna Belozubova
collection DOAJ
description Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta errors, an ability of implementation.
first_indexed 2024-03-12T18:35:19Z
format Article
id doaj.art-c7192f5bdf5544f299efe93cb20cfa16
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T18:35:19Z
publishDate 2015-10-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-c7192f5bdf5544f299efe93cb20cfa162023-08-02T08:04:29ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362015-10-0122386The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP NetworksAnna Igorevna Belozubova0Konstantin Grigorievich Kogos1Mikhail Aleksandrovich Finoshin2National Research Nuclear University MEPhINational Research Nuclear University MEPhINational Research Nuclear University MEPhIKeywords: Covert channels in IP networks are investigated. The possibilities adversary needs to construct covert channels are given. Current methods of covert channels elimination, detection and capacity limitation are examined. Detection methods are compared using such criteria: alpha and beta errors, an ability of implementation.https://bit.mephi.ru/index.php/bit/article/view/86covert channelsstorage channelstiming channelscapacitylimitationeliminationdetection
spellingShingle Anna Igorevna Belozubova
Konstantin Grigorievich Kogos
Mikhail Aleksandrovich Finoshin
The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
Безопасность информационных технологий
covert channels
storage channels
timing channels
capacity
limitation
elimination
detection
title The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
title_full The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
title_fullStr The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
title_full_unstemmed The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
title_short The Analysis of Existing Methods to Prevent the Data Leakage Using Covert Channels in IP Networks
title_sort analysis of existing methods to prevent the data leakage using covert channels in ip networks
topic covert channels
storage channels
timing channels
capacity
limitation
elimination
detection
url https://bit.mephi.ru/index.php/bit/article/view/86
work_keys_str_mv AT annaigorevnabelozubova theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks
AT konstantingrigorievichkogos theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks
AT mikhailaleksandrovichfinoshin theanalysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks
AT annaigorevnabelozubova analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks
AT konstantingrigorievichkogos analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks
AT mikhailaleksandrovichfinoshin analysisofexistingmethodstopreventthedataleakageusingcovertchannelsinipnetworks