A note on the confinement problem
Communications of the ACM
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Capacity estimation and auditability of network covert channels
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Capacity Estimation of Non-Synchronous Covert Channels
ICDCSW '05 Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Detecting covert timing channels: an entropy-based approach
Proceedings of the 14th ACM conference on Computer and communications security
Network covert channels: design, analysis, detection, and elimination
Network covert channels: design, analysis, detection, and elimination
A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
Covert Channel Capacity Analysis Based on Entropy
ISISE '08 Proceedings of the 2008 International Symposium on Information Science and Engieering - Volume 01
ACM Transactions on Information and System Security (TISSEC)
Steganographic communication in ordered channels
IH'06 Proceedings of the 8th international conference on Information hiding
A Covert Channel Detection Algorithm Based on TCP Markov Model
MINES '10 Proceedings of the 2010 International Conference on Multimedia Information Networking and Security
A bandwidth computation model for covert storage channels and its applications
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
New constructive approach to covert channel modeling and channel capacity estimation
ISC'05 Proceedings of the 8th international conference on Information Security
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels
IEEE Transactions on Information Forensics and Security
A Survey of Covert Channels and Countermeasures in Computer Network Protocols
IEEE Communications Surveys & Tutorials
An analysis of the timed Z-channel
IEEE Transactions on Information Theory
An information-theoretic and game-theoretic study of timing channels
IEEE Transactions on Information Theory
The channel capacity of a certain noisy timing channel
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Network covert channel is an illegal communication mechanism, which can be used by attackers to steal information from compromised systems. The channel brings serious security threat, which is usually measured by the information transmission rate achieved in the channel. In this paper, we focus on evaluating the transmission rate achieved by potential covert timing channels in a network. In such channels, the delay jitter and loss of media packets correspond to the communication noise, and impact the error probability of the channel communication. Based on the analysis of the network status (e.g. delay jitter, packet loss), we propose a method to evaluate the maximum transmission rate achieved by the potential channels in a network. Then we apply the evaluation method in a real network and obtain the maximum transmission rate, without constructing actual channels and any information transmission process over the channels. Additionally, we monitor the transmission rate changing with the network status in a day.