Information Technology Reference
In-Depth Information
4
Conclusions
The paper considers the problem of building a covert channel through a PROXY
server. The channel is based upon the permutation of data in PROXY server
buffer using packet sequences coming through a router connected to the PROXY
server. Such a permutation allows to create a statistical covert channel the data
in which is being transmitted by manipulating expectation and dispersion of the
number of increasing pairs in the sequence of data addresses. The paper does not
consider the problem of data encoding by the sequence of packets (this problem
will be addressed in one of the following papers).
References
1. Grusho, A., Timonina, E.: Construction of the Covert Channels. International Work-
shop “Information Assurance in Computer Networks. Methods, Models, and Archi-
tectures for Network Security”. Springer, LNCS 2776 (2003) 428-431
2. Grusho, A.A., Timonina, E.E.: Estimation of the time needed to set up a covert
channel. Discrete Mathematics and applications, 13 , 3 (2003) 257-263
3. Prokhorov, U.V., Rozanov, U.A.: Theory of probabilities. Moscow (1973)
Search WWH ::




Custom Search