Dummy Traffic Generation to Limit Timing Covert Channels
Title | Dummy Traffic Generation to Limit Timing Covert Channels |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Belozubova, A., Epishkina, A., Kogos, K. |
Conference Name | 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) |
Date Published | Feb. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4340-2 |
Keywords | Bandwidth, channel capacity, compositionality, computer network security, covert channel, covert channel capacity formula, covert channels, cybersecurity, dummy traffic, dummy traffic generation, Entropy, hidden communication, hidden transmit information, information leakage, IP networks, IP timing covert channels, Receivers, resilience, Scalability, security policy, telecommunication traffic, Timing, timing channel |
Abstract | Covert channels are used to hidden transmit information and violate the security policy. What is more it is possible to construct covert channel in such manner that protection system is not able to detect it. IP timing covert channels are objects for research in the article. The focus of the paper is the research of how one can counteract an information leakage by dummy traffic generation. The covert channel capacity formula has been obtained in case of counteraction. In conclusion, the examples of counteraction tool parameter calculation are given. |
URL | https://ieeexplore.ieee.org/document/8317375 |
DOI | 10.1109/EIConRus.2018.8317375 |
Citation Key | belozubova_dummy_2018 |
- hidden communication
- timing channel
- timing
- telecommunication traffic
- security policy
- Scalability
- resilience
- Receivers
- IP timing covert channels
- IP networks
- Information Leakage
- hidden transmit information
- Bandwidth
- Entropy
- dummy traffic generation
- dummy traffic
- Cybersecurity
- covert channels
- covert channel capacity formula
- covert channel
- computer network security
- Compositionality
- channel capacity