Detection of Illegal Information Flow

  • Alexander Grusho
  • Alexander Kniazev
  • Elena Timonina
Conference paper

DOI: 10.1007/11560326_18

Volume 3685 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Grusho A., Kniazev A., Timonina E. (2005) Detection of Illegal Information Flow. In: Gorodetsky V., Kotenko I., Skormin V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg

Abstract

Several types of statistical covert channels that break the informational system security policy ensuring a reliable information transfer between hostile agents can be detected by a competent warden. We introduce the basic detection technique and analyze the conditions under which the warden with limited resources can perform his task successfully.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Alexander Grusho
    • 1
  • Alexander Kniazev
    • 2
  • Elena Timonina
    • 1
  1. 1.Russian State University for HumanityMoscowRussian Federation
  2. 2.Lebedev Institute of Precise Mechanics and Computer TechnologyRussian Academy of SciencesMoscowRussian Federation