Preview

World of Transport and Transportation

Advanced search

COVERT CHANNELS OF INFORMATION TRANSFER

https://doi.org/10.30932/1992-3252-2017-15-4-5

Abstract

For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version).ABSTRACT The article deals with the organization of hidden channels of information transfer with the help of embedded agents in operating systems. The current state of research in this field of science, comparison with the world level, shows that there are no theoretical developments of hidden channel analyzers, as well as software and hardware implementation of their models. The author offers his approach to creating covert channel analyzers based on methods of self-organization, as well as an algorithm for network operations that allows to perform the functions of entanglement of packets in order to destroy the process of transmitting information over hidden channels. Keywords: information channels, corporate network, hidden channel, analyzer, secret agent, packet, perceptron.

About the Author

V. M. Alekseev
Российский университет транспорта (МИИТ)
Russian Federation


References

1. Info Jett.[Электронный ресурс]: http://www.jetinfo.ru/jetinfo_arhiv/raspredelennye-ataki-na-raspredelennye-sistemy/o-kanalakh-skrytykh-potajnykh-pobochnykh-i-ne-tolko/2006.Доступ 10.01.2017.

2. Internet-technology.[Электронный ресурс]: http://www.internet-technologies.ru/articles/ article_2826.html.Доступ 10.01.2017.

3. Грушко А. А. Скрытые каналы и безопасность информации в компьютерных системах // Дискретная математика. - 1998. - № 1. - С. 3-9.

4. Алексеев В. М. Система мониторинга информационной безопасности для высокоскоростного транспорта // Наука и техника транспорта. - 2016. - № 4. - С. 71-79.

5. Alcaraz C., Lopez J., Kim-Kwang, Choob R.Resilient interconnection in cyber-physical control systems: Computers & Security, Vol.71, October 2017, pp.2-14.

6. Osborn E., Simpson A. On small-scale IT user’s system architectures and cyber security: A UK case study: Computers & Security, Vol.70, September 2017, pp.27-50.

7. Lei Ding, Jun Liu, Tao Qin, Haifei Li Internet traffic classification based on expanding vector of flow Computer Networks, October 2017, pp.178-192.

8. Hongtao Sun, Chen Peng, Taicheng Yang, Hao Zhang, Wangli He Resilient control of networked control systems with stochastic denial of service attacks, Neurocomputing, October 2017, pp.170-177.


Review

For citations:


Alekseev V.M. COVERT CHANNELS OF INFORMATION TRANSFER. World of Transport and Transportation. 2017;15(4):50-56. https://doi.org/10.30932/1992-3252-2017-15-4-5

Views: 266


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1992-3252 (Print)