Abstract
The paper is devoted to creating a covert channel through a PROXY server. The channel is based upon data permutation in server buffer using the sequence of packets coming from the router connected to the PROXY server. The resulting data flow allows to create a statistical covert channel that transfers information by manipulating expectation and dispersion of the number of increasing pairs in the sequence of network addresses.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Grusho, A., Timonina, E.: Construction of the Covert Channels. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 428–431. Springer, Heidelberg (2003)
Grusho, A.A., Timonina, E.E.: Estimation of the time needed to set up a covert channel. Discrete Mathematics and applications 13(3), 257–263 (2003)
Prokhorov, U.V., Rozanov, U.A.: Theory of probabilities. Moscow (1973)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Galatenko, A., Grusho, A., Kniazev, A., Timonina, E. (2005). Statistical Covert Channels Through PROXY Server. In: Gorodetsky, V., Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2005. Lecture Notes in Computer Science, vol 3685. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11560326_34
Download citation
DOI: https://doi.org/10.1007/11560326_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29113-8
Online ISBN: 978-3-540-31998-6
eBook Packages: Computer ScienceComputer Science (R0)