The Technique to Prevent the Data Leakage using Covert Channels
The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2013-12-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/296 |
Summary: | The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated. |
---|---|
ISSN: | 2074-7128 2074-7136 |