Towards optimized TCP/IP covert channels detection, IDS and firewall integration

Senda Hammouda, Lilia Maalej, Zouheir Trabelsi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Covert channels exist in most communications systems and allow individuals to communicate truly undetectable and exchange hidden information. That's why their detection seems to be a big deal for security systems. However, till now, security systems do not include dedicated processes for covert channel detection. In this paper, we first propose mechanisms to detect common covert channels. Then, within a whole security system, we propose an optimized order regarding the execution of the three major security processes: Firewall, Intrusion Detection System (IDS) and Covert Channel Detection System (CCDS). It will be demonstrated that the proposed order would allow security systems to offer better processing performances.

Original languageEnglish
Title of host publicationProceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008
DOIs
Publication statusPublished - 2008
EventNew Technologies, Mobility and Security Conference and Workshops, NTMS 2008 - Tangier, Morocco
Duration: Nov 5 2008Nov 7 2008

Publication series

NameProceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008

Other

OtherNew Technologies, Mobility and Security Conference and Workshops, NTMS 2008
Country/TerritoryMorocco
CityTangier
Period11/5/0811/7/08

Keywords

  • Covert channel system
  • Firewall
  • Intrusion detection
  • TCP/IP protocols

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Towards optimized TCP/IP covert channels detection, IDS and firewall integration'. Together they form a unique fingerprint.

Cite this