Almost all modern computer networks are based on TCP/IP protocol suite. However, structure features of IP allow constructing covert channels with high capacity using modification of inter-packets delays, packets’ header fields and packets lengths. A technique to eliminate such channels is traffic normalization which means sending packets with equal lengths and fixed header fields with equal inter-packets delays that leads to significant decreasing of efficient communication channels capacity and missing of functional capabilities of network protocols. Another way to counteract covert channel is to detect an active channel. Nevertheless, an attacker can reduce the covert channel capacity purposely to make it undetectable. We investigate on/off covert channel and give recommendations to choose the parameters of ε-similarity detection method with specified threshold values of covert channels capacity.
CITATION STYLE
Epishkina, A., Finoshin, M., & Kogos, K. (2016). Information Science and Applications (ICISA) 2016. Lecture Notes in Electrical Engineering, 376, 641–650. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84959162811&partnerID=tZOtx3y1
Mendeley helps you to discover research relevant for your work.