13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Z. Kwecka, BSc (Hons) Network Computing, 2006 46server. Here if the requests do not follow the major rules set by HTTP specification,they will be ignored. However, this is a vital part of the detection process, whichcould a large number of covert-channels’ implementations with minimal processingrequired.5.6 ConclusionsDue to the time restrictions of this project only the Inline Filtering Agent has beenimplemented out of the original design of the prototype. However, implementation ofa filtering Proxy server was previously (Chapter 4) identified as the first <strong>and</strong> mostimportant step in protection against threats to information confinement posed bycovert channels. Additionally set of test software tools was successfully implemented,<strong>and</strong> the experiments could proceed to collect data for analyse of the validity of theproposed solution to problem.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!