Simulation, optimisation and integration of covert channels, intrusion detection and packet filtering systems

Lilia Frikha, Zouheir Trabelsi, Sami Tabbane

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In a Communication network, an advanced security system should include three security processes, namely a packet filter (Firewall), an Intrusion Detection System (IDS), and a Covert Channels Detection System (CCDS). The Firewall filters the incoming and outgoing network traffic. The IDS detects and stops attacks, such as Denial of Service (DoS) attacks. Covert channels allow individuals to comm unicate undetectable and exchange hidden information. A CCDS detects and stops covert channels. However, till now, security systems do not include dedicated processes for covert channel detection. In this paper we propose an optimized order regarding the execution of the three processes, and evaluate the system's performance when the LAN network is under different types of attacks. The results show that the proposed order enhances the processing time performance of the system. copy; 2009 IEEE.

Original languageEnglish
Title of host publication2009 Global Information Infrastructure Symposium, GIIS '09
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 Global Information Infrastructure Symposium, GIIS '09 - Hammemet, Tunisia
Duration: Jun 23 2009Jun 26 2009

Publication series

Name2009 Global Information Infrastructure Symposium, GIIS '09

Other

Other2009 Global Information Infrastructure Symposium, GIIS '09
Country/TerritoryTunisia
CityHammemet
Period6/23/096/26/09

Keywords

  • Covert channel system
  • Detection TCP/IPprotocols
  • Firewall
  • Intrusion

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Simulation, optimisation and integration of covert channels, intrusion detection and packet filtering systems'. Together they form a unique fingerprint.

Cite this