22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

152 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Apart from this more subtle ways of data transmission have to be taken into<br />

account. Steganography is the art of hiding information inside other information<br />

in order to conceal the existence of the hidden message altogether. An overview<br />

of relevant definitions can be found in [5]. A well-known example is replacing<br />

the least significant bit of color information of pixels in an image file with the embedded<br />

message. A human observer is unlikely to notice the difference, but evading<br />

detection through statistical analysis will require more advanced techniques.<br />

Anderson explains several mechanisms in [6].<br />

Covert channels are a related topic. They are used to transmit data from<br />

an object with a high classification (High) to one with a low classification (Low).<br />

In [6] a covert channel is defined as a mechanism not intended for communication<br />

which can be abused to communicate information from High to Low. In [7]<br />

the components of a covert channel, different examples <strong>and</strong> countermeasures are<br />

explained. A covert channel consists of a data variable <strong>and</strong> two synchronization<br />

variables, one sender-receiver (s-r) <strong>and</strong> one receiver-sender (r-s) synchronization<br />

variable. The first two variables are properties of the system which can be set by<br />

High <strong>and</strong> read by Low. The last one can be set by Low <strong>and</strong> read by High (Figure 2).<br />

High sets the data variable to a state representing the information to be transmitted.<br />

In the simplest case one of two states representing either 1 or 0 is set. High then<br />

uses the s-r variable to indicate that data can be received. Low reads the data variable<br />

<strong>and</strong> uses the r-s variable to inform High that it has received data. This process<br />

is repeated until all data has been transmitted.<br />

Figure 2. Covert channel components (see [7])<br />

When a common time reference is used for instead of the synchronization<br />

variables, the channel is called a timing channel otherwise it is called a storage<br />

channel. Properties of shared resources can be used as variables. A simple example<br />

is a hard disk shared by High <strong>and</strong> Low with access control mechanisms in place<br />

to prevent Low from reading files owned by High. High can allocate almost all

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!