An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels

Pradhumna L. Shrestha, Michael Hempel, Hamid Sharif, Hsiao Hwa Chen

研究成果: Article同行評審

5 引文 斯高帕斯(Scopus)


Covert channels are communication channels to transmit information utilizing existing system resources without being detected by network security elements, such as firewalls. Thus, they can be utilized to leak confidential governmental, military, and corporate information. Malicious users, like terrorists, can use covert channels to exchange information without being detected by cyber-intelligence services. Therefore, covert channels can be a grave security concern, and it is important to detect, eliminate, and disrupt covert communications. Active network wardens can attempt to eliminate such channels by traffic modification, but such an implementation will also hamper innocuous traffic, which is not always acceptable. Owing to a large number of covert channel algorithms, it is not possible to deal with them on a case-by-case basis. Therefore, it necessitates a unified system model that can represent them. In this paper, we present an event-based model to represent timing covert channels. Based on our model, we calculate the capacity of various covert channels and evaluate their essential features, such as the impact of network jitter noise and packet losses. We also used simulations to obtain these parameters to verify its accuracy and applicability.

頁(從 - 到)271-280
期刊IEEE Systems Journal
出版狀態Published - 2016 3月

All Science Journal Classification (ASJC) codes

  • 控制與系統工程
  • 資訊系統
  • 電腦科學應用
  • 電腦網路與通信
  • 電氣與電子工程


深入研究「An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels」主題。共同形成了獨特的指紋。