The capacity of a~packet length covert channel
Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 96-99.

Voir la notice de l'article provenant de la source Math-Net.Ru

Covert channels are used for information hiding and realize one of the most serious security threat. Widespread IP networks allow for designing such channels on the basis of special properties of packet data transfer. Packet length covert channels are resistant to traffic encryption, but some difficulties to detect them are known. It makes significant an investigation of capacity limitation methods. This work presents a technique to estimate and limit the capacity of the covert channels based on the packet length modulation by traffic padding.
Keywords: covert channel, packet length, dummy packet, capacity limitation.
@article{PDMA_2015_8_a35,
     author = {A. V. Epishkina and K. G. Kogos},
     title = {The capacity of a~packet length covert channel},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {96--99},
     publisher = {mathdoc},
     number = {8},
     year = {2015},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2015_8_a35/}
}
TY  - JOUR
AU  - A. V. Epishkina
AU  - K. G. Kogos
TI  - The capacity of a~packet length covert channel
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2015
SP  - 96
EP  - 99
IS  - 8
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2015_8_a35/
LA  - en
ID  - PDMA_2015_8_a35
ER  - 
%0 Journal Article
%A A. V. Epishkina
%A K. G. Kogos
%T The capacity of a~packet length covert channel
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2015
%P 96-99
%N 8
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2015_8_a35/
%G en
%F PDMA_2015_8_a35
A. V. Epishkina; K. G. Kogos. The capacity of a~packet length covert channel. Prikladnaya Diskretnaya Matematika. Supplement, no. 8 (2015), pp. 96-99. http://geodesic.mathdoc.fr/item/PDMA_2015_8_a35/

[1] Lampson B. W., “A note on the confinement problem”, Comm. ACM, 16:10 (1973), 613–615 | DOI

[2] Cabuk S., Brodley C. E., Shields C., “IP covert timing channels: design and detection”, Proc. CCS'04 (October 25–29, 2004, Washington, DC, USA), 178–187