{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2021-03-18T15:44:55.247223+00:00", "custom_fields": { "journal:journal": { "issue": "3-4", "pages": "81-93", "title": "International Journalon Advances in Security", "volume": "5" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "sec_v5_n34_2012_2.pdf": { "checksum": "md5:07b9ea68ff7ef5d705ba95d2b989d086", "ext": "pdf", "id": "5d55df1e-fd69-484d-8f0e-e389c92411e6", "key": "sec_v5_n34_2012_2.pdf", "metadata": null, "mimetype": "application/pdf", "size": 8288337 } }, "order": [], "total_bytes": 8288337 }, "id": "4618134", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/4618134/access", "access_links": "https://zenodo.org/api/records/4618134/access/links", "access_request": "https://zenodo.org/api/records/4618134/access/request", "access_users": "https://zenodo.org/api/records/4618134/access/users", "archive": "https://zenodo.org/api/records/4618134/files-archive", "archive_media": "https://zenodo.org/api/records/4618134/media-files-archive", "communities": "https://zenodo.org/api/records/4618134/communities", "communities-suggestions": "https://zenodo.org/api/records/4618134/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.4618134", "draft": "https://zenodo.org/api/records/4618134/draft", "files": "https://zenodo.org/api/records/4618134/files", "latest": "https://zenodo.org/api/records/4618134/versions/latest", "latest_html": "https://zenodo.org/records/4618134/latest", "media_files": "https://zenodo.org/api/records/4618134/media-files", "parent": "https://zenodo.org/api/records/4618133", "parent_doi": "https://zenodo.org/doi/10.5281/zenodo.4618133", "parent_html": "https://zenodo.org/records/4618133", "requests": "https://zenodo.org/api/records/4618134/requests", "reserve_doi": "https://zenodo.org/api/records/4618134/draft/pids/doi", "self": "https://zenodo.org/api/records/4618134", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.4618134", "self_html": "https://zenodo.org/records/4618134", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:4618134/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:4618134/sequence/default", "versions": "https://zenodo.org/api/records/4618134/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "additional_descriptions": [ { "description": "Code is available: https://github.com/cdpxe/NetworkCovertChannels", "type": { "id": "notes", "title": { "de": "Anmerkungen", "en": "Notes" } } } ], "creators": [ { "affiliations": [ { "name": "FernUniversit\u00e4t in Hagen" } ], "person_or_org": { "family_name": "Steffen Wendzel", "identifiers": [ { "identifier": "0000-0002-1913-5912", "scheme": "orcid" } ], "name": "Steffen Wendzel", "type": "personal" } }, { "affiliations": [ { "name": "FernUniversit\u00e4t in Hagen" } ], "person_or_org": { "family_name": "J\u00f6rg Keller", "name": "J\u00f6rg Keller", "type": "personal" } } ], "description": "
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques arose which are based on the capability of protocol switching. Such protocol switching covert channels operate within overlay networks and can (asa special case) contain their own internal control protocols. We present the first approach to effectively limit the bitrate of such covert channels by introducing a new active warden.We present a calculation method for the maximum usable bitrate of these channels in case the active warden is used. We discuss implementation details of the active warden and discuss results from experiments that indicate the usability in practice. Additionally, we present means to enhance the practical application of our active warden by applying a formal grammar-based whitelisting and by proposing the combination of a previously developed detection technique in combination with our presented approach.
", "languages": [ { "id": "eng", "title": { "en": "English" } } ], "publication_date": "2012-01-01", "publisher": "Zenodo", "related_identifiers": [ { "identifier": "http://www.thinkmind.org/articles/sec_v5_n34_2012_2.pdf", "relation_type": { "id": "isidenticalto", "title": { "de": "Ist identisch mit", "en": "Is identical to" } }, "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "scheme": "url" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Covert Channels" }, { "subject": "Data Leakage Protection" }, { "subject": "Active Wardens" }, { "subject": "Information Hiding" }, { "subject": "Steganography" }, { "subject": "Network Security" }, { "subject": "Information Security" }, { "subject": "Cybersecurity" } ], "title": "Preventing Protocol Switching Covert Channels", "version": "1.0.0" }, "parent": { "access": { "owned_by": { "user": 204291 } }, "communities": {}, "id": "4618133", "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.4618133", "provider": "datacite" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.4618134", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:4618134", "provider": "oai" } }, "revision_id": 3, "stats": { "all_versions": { "data_volume": 372975165.0, "downloads": 45, "unique_downloads": 41, "unique_views": 46, "views": 50 }, "this_version": { "data_volume": 372975165.0, "downloads": 45, "unique_downloads": 41, "unique_views": 46, "views": 50 } }, "status": "published", "updated": "2021-03-19T00:27:09.081589+00:00", "versions": { "index": 1, "is_latest": true } }