Abstract
The purpose of this work is the demonstration of an adversary intrusion into protected computing system, when the covert channels are poorly taken into account. We consider an opportunity of overcoming the protection mechanisms placed between a protected segment of a local area network and a global network (for example, Internet). We discuss the ability for a warden to reveal the covert channels. The work is supported with the grant RFBR # 01-01-00895.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kolchin, V.F., Sevastianov, B.A., Chistyakov, V.P.: Random accommodations. Science, Moscow (1976)
Timonina, E.E.: The covert channels (review). Jet Info, pp. 3-11 (November 2002)
Ahsan, K., Kundur, D.: Practical Data Hiding in TCP/IP. In: Workshop Multimedia and Security at ACM Multimedia 2002, December 6. Juan-les-Pins on the French Riviera (2002)
A Guide to Understanding Covert Channel Analysis of Trusted Systems. In: National Computer Security Center, NCSC-TG-030, ver. 1 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Grusho, A., Timonina, E. (2003). Construction of the Covert Channels. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_38
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive