Application Layer Covert Channel Analysis and ... - Bill Buchanan
Application Layer Covert Channel Analysis and ... - Bill Buchanan
Application Layer Covert Channel Analysis and ... - Bill Buchanan
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Z. Kwecka, BSc (Hons) Network Computing, 2006 46server. Here if the requests do not follow the major rules set by HTTP specification,they will be ignored. However, this is a vital part of the detection process, whichcould a large number of covert-channels’ implementations with minimal processingrequired.5.6 ConclusionsDue to the time restrictions of this project only the Inline Filtering Agent has beenimplemented out of the original design of the prototype. However, implementation ofa filtering Proxy server was previously (Chapter 4) identified as the first <strong>and</strong> mostimportant step in protection against threats to information confinement posed bycovert channels. Additionally set of test software tools was successfully implemented,<strong>and</strong> the experiments could proceed to collect data for analyse of the validity of theproposed solution to problem.