The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Almost all people's data is stored on their personal devices. For this reason, there is a need to protect information from unauthorized access by means of user authentication. PIN codes, passwords, tokens can be forgotten, lost, transferred, brute-force attacked. For this reason, biometric authentication is gaining in popularity. Biometric data are unchanged for a long time, different for users, and...
This paper focuses on continuous user authentication based on its interaction with the device. Behavioral authentication provides the ability to partially abandon passwords. Furthermore, the use of human behavior, for example, how he holds the device in hand, interacts with a screen, as a means of authentication is sufficiently protected from compromise, since an attacker cannot make an exact copy...
Covert channels lead to hidden data transfer and packet networks provide a lot of mechanisms to construct covert channels. Packet length covert channels are resistant to traffic encryption, but there are some data transfer schemes that are difficult to detect. Therefore investigating of packet length covert channels is quite topical. The purpose of this paper is to examine maximum covert channels...
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. The authors have proposed and investigated the way to counter the leakage of information via IP timing covert channels by introducing additional random delays before packets' sending. The main topic of the research is the case when the capacity of the covert channel...
The purpose of this work is to show that the course, Mathematical Logic and Theory of Algorithms, lectured by the authors in National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) is the mathematical background of the cryptology study. Bachelors and specialists information security teaching has to focus attention on the mathematical training, therefore a set of mathematical...
Nowadays information technologies are widespread and used in every computer-based system, hence information security tasks are quite important and their successful solution is required in business process. Cryptographic means are used in different applications, especially in cases when data confidentiality should be provided; although they can be utilized to maintain data availability and integrity,...
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. The authors have proposed and explored the way to counter the leakage of information via covert channels by introducing additional random delays before packets' sending. The main topic of the research is the case when the capacity of the covert channel without error...
Devices to provide one-way data transfer are known as one-way gateways and used in various security applications. The main problem to be solved by one-way gateways is to make secure communication between network segments with different security levels to maintain multilevel security policy. Although one-way gateways are utilized in lot of information systems, there is no solution, including ‘air gap’,...
In state of the art information systems some special digital signature schemes are utilized since traditional cryptographic primitives do not allow to solve a number of topical security tasks. The following signature schemes are widespread nowadays: threshold signatures, blind signatures, group signatures, ring signatures, etc. Fail-stop signature schemes are also quite investigated but are not used...
This paper observes different methods for network covert channels constructing and describes the scheme of the packet length covert channel. The countermeasure based on random traffic padding generating is proposed. The capacity of the investigated covert channel is estimated and the relation between parameter of covert channel and counteraction tool is examined. Practical recommendation for using...
Nowadays applications for big data are widely spread since IP networks connect milliards of different devices. On the other hand, there are numerous accidents of information leakage using IP covert channels worldwide. Covert channels based on packet size modification are resistant to traffic encryption, but there are some data transfer schemes that are difficult to detect. Investigation of the technique...
This paper describes a packet length network covert channel and violators possibilities to build such a channel. Then the technique to estimate and limit the capacity of such channel is presented. The calculation is based on the information theory statements and helps to diminish the negative effects of covert channels in information systems, e.g. data leakage.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.