Systems and Means of Informatics
November 2013, Volume 23, Issue 2, pp 6-21
COVERT CHANNELS GENERATED BY TAGS IN DATAGRAMS
- A. A. Grusho
- N. A. Grusho
- E. E. Timonina
Abstract
The covert channels generated by tags, are defined by separation in a data stream of sections which lengths are codes of hidden transmitted data. In the paper such covert channels are described by a couple of synchronized processes. The correctness of coding and decoding of hidden information in such channels is proved. Such covert channels can be used not only for hidden information transfer, but also for integrity monitoring. Implementation ability of the considered methods is confirmed experimentally.
[+] References (18)
- Lampson, B.W. 1973. A note of the confinement problem. Comm. ACM 16(10):613-15.
- National Computer Security Center. 1993. A guide to understanding covert channel
analysis of trusted systems. NCSC-TG-30. Ver. 1.
- Grusho, A.A., and E.E. Timonina. 2003. Preodolenie zashhity ot skrytyh kanalov
[Overcoming of protection against the covert channels].Obozrenie prikladnoj i promyshlennoj matematiki [Review of Applied and Industrial Mathematics] 10(3):638.
- Timonina, E.E. 2004.Analiz ugroz skrytyh kanalov i metody postroenija garantirovanno zashhishhennyh raspredelennyh avtomatizirovannyh system [The analysis of threats
of the covert channels and methods of creation of guaranteed protected distributed
automated systems]. D.Sc. Dissertation.M.: RGGU [Russian State University for the
Humanities]. 204 p.
- GOST R 53113.1-2008. 2008. Informacionnaja tehnologija. Zashhita informacionnyh
tehnologij i avtomatizirovannyh sistem ot ugroz informacionnoj bezopasnosti, realizuemyh s ispol'zovaniem skrytyh kanalov. Ch. 1. Obshhie polozhenija [Information
technology. Protection of information technologies and automated systems against the
threats of the information security implemented with use of covert channels. Part 1.
General provisions]. M.: Izd-vo Standartov [Publishing House of Standards].
- GOST R 53113.2-2009. 2009. Informacionnaja tehnologija. Zashhita informacionnyh
tehnologij i avtomatizirovannyh sistem ot ugroz informacionnoj bezopasnosti, realizuemyh s ispol'zovaniem skrytyh kanalov. Ch. 2. Rekomendacii po organizacii zashhity informacii, informacionnyh tehnologij i avtomatizirovannyh sistem ot atak s
ispol'zovaniem skrytyh kanalov [Information technology. Protection of information
technologies and automated systems against the threats of the information security
implemented with use of covert channels. Part 2. Recommendations about the organi-
zation of information security, information technologies and automated systems from
attacks with use of the covert channels]. M.: Izd-vo Standartov [Publishing House of
Standards].
- Grusho, N.A. 2013. Skrytye kanaly, osnovannye na metkah [The covert channels
based on tags]. Sistemy i sredstva informatiki [Systems and Means of Informatics]
23(1):7-13.
- Timonina, E.E. 2002. Skrytye kanaly (obzor) [Covert channels (review)]. Jet Info
14(114):3-11.
- Min, Wu, and L. Bede. 2003. Multimedia data hiding. New York: Springer. 219 p.
- Gribunin, V.G., I. N. Okov, and I.V. Turincev. 2002. Cifrovaja steganografija
[Digital steganography].M.: SOLON-Press, 272 p.
- Kohanovich, G. F., and A. Ju. Puzyrenko. 2006. Komp'juternaja steganografija. Teorija i praktika [Computer steganography. Theory and practice]. Kiev:MK-Press. 288 p.
- Grusho, A.A., N.A. Grusho, and E.E. Timonina. 2009. Metody zashhity informacii ot
atak s pomoshh'ju skrytyh kanalov i programmno-apparatnyh agentov v raspredelennyh
sistemah [Information securitymethods fromattackswith the help of covert channels and
hardware-software agents in distributed systems]. Vestnik RGGU: Nauchnyj zhurnal:
Serija "Informatika. Zashhita informacii. Matematika" [RSUH Bulletin. Sci. J.:
"Information Science. Information Security. Mathematics"] 10:33-45.
- Skorobogatov, S.P. 2005. Semi-invasive attacks|a newapproach to hardware security
analysis. Technical Report UCAM-CL-TR-630.
- Grusho, A., N. Grusho, and E. Timonina. 2010. Problems of modeling in the analysis
of covert channels. Lecture Notes Computer Sci. LNCS 6258:118-24.
- Grusho, A.A., and E.E. Timonina. 2011. Zaprety v diskretnyh verojatnostno-
statisticheskih zadachah [Bans in the discrete probable and statistical problems].
Diskretnaja matematika [Discrete Mathematics] 23(2):53-58.
- Grusho, A., E. Timonina, and A. Kniazev. 2005. Detection of illegal information flow.
Lecture Notes Computer Sci. LNCS 3685:424-29.
- Ahsan, K., and D. Kundur. 2002. Practical data hiding in TCP/IP. Workshop on
Multimedia Security at ACM Multimedia'02 Proceedings. Juan-les-Pins, France.
- Shannon, K. 1963. Raboty po teorii informacii i kibernetike [Works on theory of
informatics and cybernetics]. M.: IL [Foreign Literature Publs.].
[+] About this article
Title
COVERT CHANNELS GENERATED BY TAGS IN DATAGRAMS
Journal
Systems and Means of Informatics
Volume 23, Issue 2, pp 6-21
Cover Date
2013-11-30
DOI
10.14357/08696527130201
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
covert channels, integrity monitoring, invisibility of the covert channels, transfer protocols of datagrams
Authors
A. A. Grusho , N. A. Grusho , E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Russian Academy of Sciences
|