Methods of protection from the covert channels in the automated systems and their channel capacity at some modes of opposition

Download article in PDF format

Authors: Matveev S. V.

Annotation: The estimation of security of the information in computer networks substantially depends on potential possibilities of the infringer which can be used for unauthorized access to information, including with application to covert channels. Classification of possibilities of construction of the covert channels by the infringer for a case of connection of two segments of a network by means of a boundary router is resulted. Methods providing protection against construction of the covert channels are considered. Estimations of throughput for several methods of protection against the covert channels manipulating in the speed of data transmission in the channel are resulted.

Keywords: automated system, covert channel, throughput

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates