Categorizing and Identifying with Covert Channel Based on Information Flow Analysis

2013 ◽  
Vol 427-429 ◽  
pp. 2512-2518
Author(s):  
Yang Jiao ◽  
Li Jun Xie ◽  
Zhi Yuan Zhao

Based on the security OS (SLinux) designing and implementing, this paper adopted information flow sequence to represent information flows and covert channels. Categorized the covert channels according to their information flow characteristics and discussed the integral method of dealing with covert channel. On this basis, proposed a genera l framework for covert channel identification founded on information flow analysis, and designed the optimization rules of covert channel identification. The framework and the rules can decrease the illegal flow of misinformation by restricting in formation flow combination spread, and provide the basis process for improving of analyzing covert channel.

2016 ◽  
Vol 4 (1) ◽  
pp. 40-55
Author(s):  
Yinghui Yang ◽  
Jianhua Li ◽  
Qingwei Meng ◽  
Mingli Nan

Abstract To strengthen operational process analysis and normalize information requirements description in systemic operations based on information systems, a new operational architecture modeling method is proposed from the perspective of information flow analysis. An operational architecture modeling framework based on information flow analysis is established by referring to American department of defense architecture framework (DoDAF V2.0). Concepts of entities, relationships, attributes and mapping rules are defined. Operational activity model, operational nod model and information alternation model are constructed. Finally, aerial assault operation is taken as an example to demonstrate the modeling process. Simulation results show that operational process analysis is more refined and information requirement descriptions are more visible, normal and clear, which validate the feasibility and validity of the method and models.


Sign in / Sign up

Export Citation Format

Share Document