Detection of Illegal Information Flow
- Cite this paper as:
- Grusho A., Kniazev A., Timonina E. (2005) Detection of Illegal Information Flow. In: Gorodetsky V., Kotenko I., Skormin V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg
Several types of statistical covert channels that break the informational system security policy ensuring a reliable information transfer between hostile agents can be detected by a competent warden. We introduce the basic detection technique and analyze the conditions under which the warden with limited resources can perform his task successfully.
Unable to display preview. Download preview PDF.