Abstract
For the English abstract and full text of the article please see the attached PDF-File (English version follows Russian version).ABSTRACT The article deals with the organization of hidden channels of information transfer with the help of embedded agents in operating systems. The current state of research in this field of science, comparison with the world level, shows that there are no theoretical developments of hidden channel analyzers, as well as software and hardware implementation of their models. The author offers his approach to creating covert channel analyzers based on methods of self-organization, as well as an algorithm for network operations that allows to perform the functions of entanglement of packets in order to destroy the process of transmitting information over hidden channels. Keywords: information channels, corporate network, hidden channel, analyzer, secret agent, packet, perceptron.
Publisher
FSBEO HPE Moscow State University of Railway Engineering (MIIT)
Reference8 articles.
1. Info Jett.[Elektronnyi resurs]: http://www.jetinfo.ru/jetinfo_arhiv/raspredelennye-ataki-na-raspredelennye-sistemy/o-kanalakh-skrytykh-potajnykh-pobochnykh-i-ne-tolko/2006.Dostup 10.01.2017.
2. Internet-technology.[Elektronnyi resurs]: http://www.internet-technologies.ru/articles/ article_2826.html.Dostup 10.01.2017.
3. Grushko A. A. Skrytye kanaly i bezopasnost' informatsii v komp'yuternykh sistemakh // Diskretnaya matematika. - 1998. - № 1. - S. 3-9.
4. Alekseev V. M. Sistema monitoringa informatsionnoi bezopasnosti dlya vysokoskorostnogo transporta // Nauka i tekhnika transporta. - 2016. - № 4. - S. 71-79.
5. Alcaraz C., Lopez J., Kim-Kwang, Choob R.Resilient interconnection in cyber-physical control systems: Computers & Security, Vol.71, October 2017, pp.2-14.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献