ОГРАНИЧЕНИЕ ПРОПУСКНОЙ СПОСОБНОСТИ СЕТЕВЫХ СКРЫТЫХ КАНАЛОВ ПО ВРЕМЕНИ ПУТЕМ ВВЕДЕНИЯ ДОПОЛНИТЕЛЬНЫХ СЛУЧАЙНЫХ ЗАДЕРЖЕК ПЕРЕД ОТПРАВКОЙ ПАКЕТА
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. Lampson B.W. A Note on the Confinement Problem. Communications of the ACM. Vol. 16, no. 10, 1973.
P. 613–615. DOI: http://dx.doi.org/10.1145/362375.362389.
2. Ahsan K., Kundur D. Practical Data Hiding in TCP/IP. Proceedings of the ACM Workshop on Multimedia Security, 2002. URL: https://www.researchgate.net/publication/2878386_Practical_data_hiding_in_TCPIP (дата обращения: 01.08.2021).
3. Zander S., Armitage G., Branch B. Covert Channels in the IP Time To Live Field. Proceedings of the Australian Telecommunication Networks and Applications Conference, 2006.
URL: https://www.researchgate.net/publication/228875924_Covert_channels_in_the_IP_time_to_live_field (дата обращения: 01.08.2021).
4. Zander S., Armitage G., Branch P. A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys and Tutorials. Vol. 9, no. 3, 2007. P. 44–57. DOI: http://dx.doi.org/10.1109/COMST.2007.4317620.
5. Epishkina A., Kogos K. A random traffic padding to limit packet size covert channels. Proceedings of the 2015 Federated Conference on Computer Science and Information Systems. Vol. 5, 2015. P. 1107–1113. DOI: http://dx.doi.org/10.15439/2015F88.
6. Epishkina A., Kogos K. Covert channels parameters evaluation using the information theory statements. Proceedings of the 5th International Conference on IT convergence and security. 2015. P. 395–399. DOI: http://dx.doi.org/10.1109/ICITCS.2015.7292966.
7. Cabuk S., Brodley C.E., Shields C. IP covert timing channels: design and detection. Proceedings of the eleventh ACM conference on computer and communications security. 2004. P. 178–187.
DOI: http://dx.doi.org/10.1145/1030083.1030108.
8. Girling C.G. Covert channels in LAN’s. IEEE Transactions on software engineering. Vol. 13, no. 2, 1987.
P. 292–296. DOI: http://dx.doi.org/10.1109/COMST.2007.4317620.
9. Shah G., Molina A., Blaze M. Keyboards and Covert Channels. Proceedings of the 15th USENIX Security Symposium, 2006. P. 59–75. URL: https://www.researchgate.net/publication/234829288_Keyboards_ and_Covert_Channels (дата обращения: 01.08.2021).
10. Sellke S.H., Wang C.-C., Bagchi S., Shroff N.B. Covert TCP/IP timing channels: theory to implementation. Proceedings of the 28th conference on computer communications. 2009. P. 2204–2212. DOI: http://dx.doi.org/10.1109/INFCOM.2009.5062145.
11. Грушо А.А. Скрытые каналы и безопасность информации в компьютерных системах // Дискретная математика. 1998. Т. 10, вып.1. С. 3–9. DOI: https://doi.org/10.4213/dm411.
12. Грушо А.А. О существовании скрытых каналов. Дискретная математика. 1999. Т. 11, вып. 1. С. 24–28.
DOI: https://doi.org/10.4213/dm363.
13. IBM Knowledge Center. URL: https://www.ibm.com/support/knowledgecenter/ssw_aix_71/ security/taix_audit_bandwidth.html (дата обращения: 29.06.2021).
14. Elteto T., Molnar S. On the distribution of round-trip delays in TCP/IP networks. Proceedings of the 24th Conference on Local Computer Networks lcn’99. 1999.
DOI: http://dx.doi.org/10.1109/LCN.1999.802014.
15. Karakas M. Determination of network delay distribution over the internet. Thesis submitted to the graduate school of natural and applied sciences of the middle east technical university, December 2003.
URL: https://www.semanticscholar.org/paper/De-Jitter-Buffer-Role-in-Improving-VOIP-Connection-Lebl-Mileusnić/69408025b0dfce8a24e21d54893ce2c8d627146b (дата обращения: 01.08.2021).
16. Sukhov A.M., Kuznetsova N.Yu. What type of distribution for packet delay in a global network should be used in the control theory? 2019. URL: https://www.researchgate.net/publication/45864214_What_type_ of_distribution_for_packet_delay_in_a_global_network_should_be_used_in_the_control_theory (дата обращения: 01.08.2021).
17. Sagatov E.S., Samoilova D.V., Sukhov A.M. Composite distribution for one-way packet delay in the global network, 24th Telecommunications forum TELFOR 2016.
DOI: http://dx.doi.org/10.1109/TELFOR.2016.7818726.
18. Sukhov A.M., Kuznetsova N.Yu., Pervitsky A.K., Galtsev A.A. Generating Function For Network Delay. Journal of High Speed Networks. Vol. 22, no. 4. P. 321–333, 2016. DOI: http://dx.doi.org/10.3233/JHS-160552.
19. Belozubova A., Epishkina A., Kogos K. How to limit capacity of timing covert channel by adding extra delays. Procedia Computer Science. 2021. DOI: http://dx.doi.org/10.1016/j.procs.2021.06.008.
20. Belozubova A., Epishkina A., Kogos K. On/off covert channel capacity limitation by adding extra delays. ElConRus 2021. 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering. P. 2318–2322. DOI: http://dx.doi.org/10.1109/ElConRus51938.2021.9396545.
21. Белозубова А.И., Епишкина А.В., Когос К.Г. О введении задержек для противодействия утечке информации по скрытым каналам в IP-сетях. Методы и технические средства обеспечения безопасности информации. 2019, № 28. С. 81–82. URL: https://elibrary.ru/item.asp?id=38251172.
DOI: http://dx.doi.org/10.26583/bit.2021.4.06
Ссылки
- На текущий момент ссылки отсутствуют.

Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.