Methods of protection from the covert channels in the automated systems and their channel capacity at some modes of opposition
Download article in PDF format
Authors: Matveev S. V.
Annotation: The estimation of security of the information in computer networks substantially depends on potential possibilities of the infringer which can be used for unauthorized access to information, including with application to covert channels. Classification of possibilities of construction of the covert channels by the infringer for a case of connection of two segments of a network by means of a boundary router is resulted. Methods providing protection against construction of the covert channels are considered. Estimations of throughput for several methods of protection against the covert channels manipulating in the speed of data transmission in the channel are resulted.
Keywords: automated system, covert channel, throughput