Covert channels in LAN protocols

33Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Encryption is generally understood as being the basic mechanisms for LAN security. However, usage of encryption finds its limitations in case of an unauthorized information flow via covert channels. Some covert storage and timing channels inherent in a LAN's architecture are already described in the literature. This paper takes a more general approach. It shows, that there is a potential of unused bandwidth in commonly used LAN protocols (IEEE 802.2, 802.3, 802.4, 802.5), which might be exploitable as covert channel. The key point is, that exploitation of this potential of unused bandwidth is not a question of a LAN's architecture, but is strongly dependent on the design of its internal interfaces and on its implementations. The paper describes how these channels may be blocked and emphasizes the necessity to investigate the design and implementation of the protocols as part of an evaluation of a LAN.

Cite

CITATION STYLE

APA

Wolf, M. (1989). Covert channels in LAN protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 396 LNCS, pp. 89–101). Springer Verlag. https://doi.org/10.1007/3-540-51754-5_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free