The Technique to Prevent the Data Leakage using Covert Channels

The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been...

Full description

Bibliographic Details
Main Authors: Anna Vasilievna Arkhangelskaya, Konstantin Grigorievich Kogos
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2013-12-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/296
Description
Summary:The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated.
ISSN:2074-7128
2074-7136