МЕТОД ИДЕНТИФИКАЦИИ СКРЫТЫХ КАНАЛОВ ПО ПАМЯТИ В СЕТЯХ ПАКЕТНОЙ ПЕРЕДАЧИ ДАННЫХ
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
1. Lampson B.W. A note on the confinement problem. Communications of the ACM. 1973. Vol. 16, no. 10.
Р. 613–615.
2. Тимонина Е.Е. Скрытые каналы (обзор). Jet info. 2002. Т. 14. №. 114. С. 3–11.
URL: https://www.jetinfo.ru/Sites/portal/Uploads/2002_11.DF9C812FFBD9496BAE9694E27F2D9D1D.pdf (дата обращения: 20.04.21).
3. Kogos K., Sokolov A. Methods of IPD normalization to counteract IP timing covert channels. CEUR Workshop Proceedings. 2017. Р. 118–126. URL: http://ceur-ws.org/Vol-1901/paper20.pdf (дата обращения: 20.04.21).
4. Zander S., Armitage G., Branch P. An empirical evaluation of IP Time To Live covert channels. 2007 15th IEEE International Conference on Networks. IEEE, 2007. P. 42–47.
DOI: http://dx.doi.org/10.1109/ICON.2007.4444059.
5. Zander S., Armitage G., Branch P. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials. 2007. Vol. 9, no. 3. P. 44–57.
DOI: http://dx.doi.org/10.1109/COMST.2007.4317620.
6. Rowland C.H. Covert channels in the TCP/IP protocol suite. 1997.
URL: https://firstmonday.org/ojs/index.php/fm/article/download/528/449?inline=1 (дата обращения: 20.04.21).
7. Ahsan K., Kundur D. Practical data hiding in TCP/IP. Proc. Workshop on Multimedia Security at ACM Multimedia. 2002. Vol. 2, no. 7. P. 1–8. URL: https://www.comm.toronto.edu/~dkundur/pub_pdfs/AhsKunMMSec02.pdf (дата обращения: 20.04.21).
8. Yao Q., Zhang P. Coverting channel based on packet length. Computer engineering. 2008. Vol. 34, no. 3.
P. 183–185. URL: https://en.cnki.com.cn/Article_en/CJFDTotal-JSJC200803064.htm (дата обращения: 20.04.21).
9. Ji L., Jiang W., Dai B. and Niu X. A novel covert channel based on length of messages. 2009 International Symposium on Information Engineering and Electronic Commerce. IEEE, 2009. P. 551–554.
DOI: http://dx.doi.org/10.1109/IEEC.2009.122.
10. Ji L., Liang H., Song Y. and Niu X. A normal-traffic network covert channel. 2009 International Conference on Computational Intelligence and Security. IEEE, 2009. P. 499–503.
DOI: http://dx.doi.org/10.1109/CIS.2009.156.
11. Kemmerer R.A. Shared resource matrix methodology: An approach to identifying storage and timing channels. ACM Transactions on Computer Systems (TOCS). 1983. Vol. 1, no. 3. P. 256–277.
DOI: https://doi.org/10.1145/357369.357374.
12. Porras P.A. and Kemmerer R.A. Covert flow trees: a technique for identifying and analyzing covert storage channels, Proceedings. IEEE Computer Society Symposium on Research in Security and Privacy, 1991.
P. 36–51. DOI: https://doi.org/10.1109/RISP.1991.130770.
13. Song X.M., Ju S.G. Covert Flow Graph Approach to Identifying Covert Channels. Journal of Networks. 2011. Vol. 6, no. 12. P. 1740–1746.
URL: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.658.385&rep=rep1&type=pdf#page=88 (дата обращения: 20.04.21).
14. Socket: Linux Programmer's Manual. URL: https://www.man7.org/linux/man-pages/man2/socket.2.html (дата обращения: 12.05.2020).
15. RFC 791: Internet Protocol – Data Internet Program – Protocol Specification. 1981.
URL: https://datatracker.ietf.org/doc/html/rfc791(дата обращения: 20.04.21).
16. Ss: Linux man page. URL: https://linux.die.net/man/8/ss (дата обращения: 19.03.2021).
17. Software for identifying network covert channels page.
URL: https://github.com/HayrapetyanSV/network_cc_identification/blob/master/program.py (дата обращения: 20.04.21).
DOI: http://dx.doi.org/10.26583/bit.2021.3.04
Ссылки
- На текущий момент ссылки отсутствуют.
Это произведение доступно по лицензии Creative Commons «Attribution» («Атрибуция») 4.0 Всемирная.