메뉴 건너뛰기




Volumn 55, Issue 1-2, 2012, Pages 69-79

Improving performance of network covert timing channel through Huffman coding

Author keywords

Capacity; Covert channel encoding; Covertness; Huffman coding; Network covert channel; Timing channel

Indexed keywords

CAPACITY; COVERT CHANNELS; COVERTNESS; HUFFMAN CODING; NETWORK COVERT CHANNEL; TIMING CHANNELS;

EID: 82755194868     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.01.051     Document Type: Article
Times cited : (55)

References (26)
  • 1
    • 82755195334 scopus 로고
    • NCSC
    • Trusted computer system evaluation criteria (orange book)
    • NCSC, Trusted computer system evaluation criteria (orange book) 1985.
    • (1985)
  • 2
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B.W. A note on the confinement problem. Communications of the ACM 1973, 16(10):613-615.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 4
    • 84976219767 scopus 로고    scopus 로고
    • II, Hiding data in the OSI network model
    • in: Information Hiding
    • T.G. Handel, M.T. Sandford II, Hiding data in the OSI network model, in: Information Hiding, 1996, pp. 23-38.
    • (1996) , pp. 23-38
    • Handel, T.G.1    Sandford, M.T.2
  • 5
    • 0012054514 scopus 로고    scopus 로고
    • Covert channels in the TCP/IP protocol suite
    • First Monday
    • C. Rowland, Covert channels in the TCP/IP protocol suite, First Monday, 2 (5-5).
    • , vol.2 , Issue.5
    • Rowland, C.1
  • 6
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasures in computer network protocols
    • Zander S., Armitage G.J., Branch P. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys and Tutorials 2007, 9(1-4):44-57.
    • (2007) IEEE Communications Surveys and Tutorials , vol.9 , Issue.1-4 , pp. 44-57
    • Zander, S.1    Armitage, G.J.2    Branch, P.3
  • 7
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • Yao L., Zi X., Pan L., Li J. A study of on/off timing channel based on packet delay distribution. Computers & Security 2009, 28(8):785-794. 10.1016/j.cose.2009.05.006.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 9
    • 2642534513 scopus 로고    scopus 로고
    • Practical data hiding in TCP/IP
    • in: Proc. Workshop on Multimedia Security at ACM Multimedia, Citeseer
    • K. Ahsan, D. Kundur, Practical data hiding in TCP/IP, in: Proc. Workshop on Multimedia Security at ACM Multimedia, Citeseer, 2002.
    • (2002)
    • Ahsan, K.1    Kundur, D.2
  • 11
    • 38049087058 scopus 로고    scopus 로고
    • Detection of covert channel encoding in network packet delays
    • De lUniversité de Dartmouth. Novembre.
    • V. Berk, A. Giani, G. Cybenko, N. Hanover, Detection of covert channel encoding in network packet delays, Rapport Technique TR536, de lUniversité de Dartmouth. Novembre.
    • Rapport Technique TR536
    • Berk, V.1    Giani, A.2    Cybenko, G.3    Hanover, N.4
  • 13
    • 67649823284 scopus 로고    scopus 로고
    • A formal framework for real-time information flow analysis
    • Son J., Alves-Foss J. A formal framework for real-time information flow analysis. Computer Security 2009, 28(6):421-432. 10.1016/j.cose.2009.01.005.
    • (2009) Computer Security , vol.28 , Issue.6 , pp. 421-432
    • Son, J.1    Alves-Foss, J.2
  • 16
    • 65349144517 scopus 로고    scopus 로고
    • New definition of small message criterion and its application in transaction covert channel mitigating
    • Zeng H.-T., Wang Y.-J., Zu W., Cai J.-Y., Ruan L. New definition of small message criterion and its application in transaction covert channel mitigating. Journal of Software 2009, 20(4):985-996.
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 985-996
    • Zeng, H.-T.1    Wang, Y.-J.2    Zu, W.3    Cai, J.-Y.4    Ruan, L.5
  • 17
    • 70350213805 scopus 로고    scopus 로고
    • A method for the construction of minimum-redundancy codes
    • Huffman D. A method for the construction of minimum-redundancy codes. Resonance 2006, 11(2):91-99.
    • (2006) Resonance , vol.11 , Issue.2 , pp. 91-99
    • Huffman, D.1
  • 18
    • 80054714730 scopus 로고    scopus 로고
    • 20 years of covert channel modeling and analysis
    • in: IEEE Symposium on Security and Privacy
    • J.K. Millen, 20 years of covert channel modeling and analysis, in: IEEE Symposium on Security and Privacy, 1999, pp. 113-114.
    • (1999) , pp. 113-114
    • Millen, J.K.1
  • 19
    • 82755195333 scopus 로고    scopus 로고
    • Essays about computer security
    • Centre for Communications Systems Research Cambridge, c Cambridge
    • E. Lee, Essays about computer security, Centre for Communications Systems Research Cambridge, c Cambridge..
    • Lee, E.1
  • 21
    • 51649119359 scopus 로고    scopus 로고
    • Covert channel mitigation method. For secure real-time database using capacity metric
    • Zeng H.-T., Wang Y.-J., Ruan L., Zu W., Cai J.-Y. Covert channel mitigation method. For secure real-time database using capacity metric. Journal of Communications 2008, 29(8):46-56.
    • (2008) Journal of Communications , vol.29 , Issue.8 , pp. 46-56
    • Zeng, H.-T.1    Wang, Y.-J.2    Ruan, L.3    Zu, W.4    Cai, J.-Y.5
  • 22
    • 0036494997 scopus 로고    scopus 로고
    • Maintaining security and timeliness in real-time database system
    • Ahmed Q.N., Vrbsky S.V. Maintaining security and timeliness in real-time database system. Journal of Systems and Software 2002, 61(1):15-29. 10.1016/S0164-1212(01)00111-X.
    • (2002) Journal of Systems and Software , vol.61 , Issue.1 , pp. 15-29
    • Ahmed, Q.N.1    Vrbsky, S.V.2
  • 23
    • 0028566761 scopus 로고
    • Covert channels-here to stay?
    • Fault Tolerance, Concurrency and Real Time, Security, Proceedings of the Ninth Annual Conference on, 1994
    • I. Moskowitz, M. Kang, Covert channels-here to stay?, in: Computer Assurance, 1994, COMPASS'94 Safety, Reliability, Fault Tolerance, Concurrency and Real Time, Security, Proceedings of the Ninth Annual Conference on, 1994, pp. 235-243. doi:10.1109/CMPASS.1994.318449.
    • (1994) Computer Assurance, COMPASS'94 Safety, Reliability , pp. 235-243
    • Moskowitz, I.1    Kang, M.2
  • 24
    • 82755194343 scopus 로고
    • Foundations of covert-channel detection
    • J. Millen, Foundations of covert-channel detection (1989).
    • (1989)
    • Millen, J.1
  • 25
    • 0023855640 scopus 로고
    • A bandwidth computation model for covert storage channels and its applications
    • Los Alamitos, CA, USA
    • C.-R. Tsai, V.D. Gligor, A bandwidth computation model for covert storage channels and its applications, in: IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA, 1988, pp. 108-121.
    • (1988) in: IEEE Symposium on Security and Privacy , pp. 108-121
    • Tsai, C.-R.1    Gligor, V.D.2
  • 26
    • 0036350162 scopus 로고    scopus 로고
    • Bounds on the capacity of deletion channels
    • in: Information Theory, Proceedings, 2002 IEEE International Symposium on, 2002
    • S. Diggavi, M. Grossglauser, Bounds on the capacity of deletion channels, in: Information Theory, 2002, Proceedings, 2002 IEEE International Symposium on, 2002, pp. 421-421. doi:10.1109/ISIT.2002.1023693.
    • (2002) , pp. 421-421
    • Diggavi, S.1    Grossglauser, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.