By : Nimish Agarwal.  … are those which are neither designed nor intended to transfer information at all.  … are based on "transmission by storage into.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Information Flow and Covert Channels November, 2006.
Operating System Security
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Information Hiding: Watermarking and Steganography
Western Michigan University Covert Timing Channels Omar Darwish Instructor: Professor Elise de Doncker.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
INTRODUCTION COMPUTATIONAL MODELS. 2 What is Computer Science Sciences deal with building and studying models of real world objects /systems. What is.
Overview of Digital Stenography
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Identification of Covert Channels inside Linux Kernel Based on Source Code.
Applied Cryptography for Network Security
Spread Spectrum Steganography
Introduction (Pendahuluan)  Information Security.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Introduction.
Introduction to Data communication
Protection from internal threats: Evolution of DLP or Who sets trends.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
Digital Steganography
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
GPS & GSM Based Real-Time Vehicle Tracking System.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
A Lattice Model of Secure Information Flow By Dorothy E. Denning Presented by Drayton Benner March 22, 2000.
Covert Channels in IPv6 Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Syracuse University PET 2005, Cavtat, Croatia May 31 st, 2005.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
GPS & GSM BASED CAR SECURITY SYSTEM. Student’s Name with USN No.
Network Security Celia Li Computer Science and Engineering York University.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Communication Systems
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Mike Switlick. Overview What is a covert channel? Storage / Timing Requirements Bunratty attack Covert_tcp Questions.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
INTRODUCTION. Electrical and Computer Engineering  Concerned with solving problems of two types:  Production or transmission of power.  Transmission.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
What is digital media? digital media is audio, video, and photo content that has been encoded digitally, and compressed. Encoding content involves converting.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Digital Steganography
Introduction to Steganography
Welcome
Information and Network Security
Steganography.
Spread Spectrum L.Tahani Aljehani.
Visit for more Learning Resources
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Chapter 17: Confinement Problem
Chapter 8: Monitoring the Network
THE ORANGE BOOK Ravi Sandhu
Signals and Systems Networks and Communication Department Chapter (1)
Cryptography and Network Security
Steganography Techniques and their use in Anonymity
POWERPOINT PRESENTATION
Cryptography and Network Security
Security Attacks Network Security.
Presentation transcript:

By : Nimish Agarwal

 … are those which are neither designed nor intended to transfer information at all.  … are based on "transmission by storage into variables that describe resource states”.  … are those channels that are a result of resource allocation policies and resource management implementation.  … are those that "use entities not normally viewed as data objects to transfer information from one subject to another.".

 Storage and Timing Channels.  Storage Channel :- Include all mediums that allow the direct or indirect writing of a storage location by one process and the direct or indirect reading of it by another.  Timing channels :- Include all mediums that would allow one process to signal information to another process by modulating its own use of system resources in such a way that the change in response time observed by the second process would provide information.

 Noisy and Noiseless Channels.  Noiseless covert channel uses shared resource available to sender, receiver only  Noisy covert channel uses shared resource available to sender, receive, and others  Need to minimize interference enough so that message can be read in spite of others’ use of channel

 Shared Resource Matrix (SRM)  Identify all resources that may be read or modified by processes of various classes and put them in form of matirx.  Take transitive closure.  Look for information flow in violation of policy.  Verify flow for real.

 Information Flow Method  Determine data and control flow within the program.  Determine which outputs are affected by which inputs.  Note : Difficult in the face of pointers, and recursion.

 S teganography means Steganos (Covered or Protected) + graphein (to write).  Steganography includes the concealment of information within computer files

CryptographySteganography Protecting contents of the messageConcealing the existence of message Encryption can be easily identifiedEmbedding may not be so easy to identify ConfidentialityIntegrityUn removability EncryptionYesNoYes Digital SignatureNoYesNo SteganographyYes / No Yes

 Network  Wireless :- Corrupted Headers  Modifying Existing Traffic  Images, Audio and Video Steganograms  Encryption  Canary trap and Digital Water Marking  Canary Trap :- Method of exposing Information Leak, which involves giving different version of sensitive documents to several suspects and seeing which version gets leaked.

 National Computer Security Center. A guide to understanding Covert Channel Analysis of Trusted System.  Steganography And Digital Watermarking modules03/security/students/SS5/Steganography.pdf modules03/security/students/SS5/Steganography.pdf  Steganography.  Canary Trap :-  A Discussion of Covert Channels and Steganography :- world.net/cn/papers/adiscussionofcc.pdfhttp://gray- world.net/cn/papers/adiscussionofcc.pdf