SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Submitted By: Prosunjit Biswas (@01232785)

      1. Difference between Covert Channel & Side Channel:

In the simplest definition, ‘A communication channel is covert if it is neither designed nor intended to
transfer information at all’ [1]. A more compelling definition appears as – ‘Given a security model M and
its interpretation I(M) in an operating system and any potential communication between two
subjects I(Sh) and I(Si) of ((M) is covert only if the communication between the subjects Sh and Si of the
model of M is illegal in M’ [2].

                                                                                   On the other hand, “Side channel leaks
      S                            Subjects
                                                                                 implementation-specific characteristics to
                                                                          S
      i
      d
                                                                          i      recover the secret parameters involved in
                                                                          d
      e
                                                                          e      the computation and specific to given
      C
                                                                          C      implementation.”[3] Figure 1. shows the
      h
                                                                          h
      a                                                 …….. :            a
                                                                                 position of covert channel      and side
      n                                                convert
      n                                                channel
                                                                          n      channel in a system.
                                                                          n
      e      Projection Model                                             e
      l
                                                                          l      Fig 1: Side channel & Covert channel.
                  Environment Side Effect (Heat, Sound, Power etc)



i)           Covert channel is created inside a protection model where either that channel was not identified
             or not intended for communication where as side channel stays outside the protection model
             based on the side effect of the model with the environment (ex: electromagnetic emission).
ii)          Covert channel may require cooperating sender and receiver where as side channel do not require
             sender.

Conversion between Covert channel and Side channel: As shown in figure 1b, we can convert side-

                                                      channel into covert channel and vice versa.
      M                                              We see that for model M1, C1 is side channel
      o Information Leaking
      d                                              because it stays outside the model but if we
              C1       Side channel for M1 / Covert channel for M2
      e                                              build another protection model M2 including
      l
             Protection                              M1, then C1 becomes the Covert channel for
      M      Model (M1)
                                                     M2 by leaking information from a subject in M1
  2
                                                     to other subject outside m1. Thus by changing
the protection model from M1 to M2 we can convert between side channel into covert channel. Similarly,
we can do the opposite.

Fig 1b: Conversion between side & Covert Channel

References:

[1] B.W. Lampson, "A Noto on the Confinement Problem," Communications ACM 16 (1973). 613-615.
[2] C. Tsai and V. D. Gligor, "A Bandwidth Computation Model for Covert Storage Channels and its Applications,"
    IEEE Symposium on Security and Privacy, 1988.
[3] F.-X. Standaert. Introduction to side-channel attacks. In I. M. Verbauwhede, Secure Integrated Circuit.2009
          I have not taken any help on this examination from anybody and have not given any help to
                                                  anybody.
2. Intrusion Detection & Intrusion Prevention System:
       Although both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) analyze
       the traffic and work based on different predefined rules, there are fundamental differences on how
       data they work and on action they can take. Figure 2. Shows the scope of both system in some
       great details.




                           Fig 2: Breakdown of Intrusion Detection and Intrusion Prevention System

         Differences:
         i)     IPS works with real traffic which means that the traffic, if allowed, is feed to real devices
                where as IDS works with the copy of the data, in the sense that even if we have IDS
                setup to update firewall with blocking rules, the initial attack packet has already gone
                through.
         ii)     IDS is a passive device only used for loging/reporting purpose where as IPS acts as an
                active device which can terminate network connection or user sessions based on the need
                of IPS system.


Implications of Base-rate fallacy on IPS:

Similar to the base-rate fallacy in IDS, IPS effectiveness depends on how we can improve false alarm
rate. If we use an IPS with high false alarm rate, eventually it will hurt system performance badly by
filtering / stopping legitimate traffic. So, the impact of base rate fallacy on IPS is much more critical than
its impact on IDS.



Reference:

[1] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of
the 6th ACM Conference on Cornpurer and Communications Securiry,1999.
[2] “IDS vs IPS”, available at : http://blog.inetu.net/2011/02/intrusion-detection-or-prevention-ids-vs-ips/
[3] “IDS vs IPS”, available at : http://www.focus.com/fyi/ids-vs-ips/



       I have not taken any help on this examination from anybody and have not given any help to
                                               anybody.
3. Continuous enforcement ensures that the control on a resource stays even after access to that resource
    is given to a user. Thus, it is required to monitor consumption of the resource or subsequent request for
    consumption so that it does not violate the policy under which access was granted. In the following
    model, I am not considering how the resource is consumed which is very inflexible to monitor in real
    situation. This model tries to provide continuous enforcement where continuous requests for a resource
    are made and each request has some side effect in the system. Fig. 3a. gives a general model for
    continuous enforcement while fig. 3b is specialized model for video streaming service provider.

                                                               I
                                                           S   n
                                                                                                                           G
S                                                          e   s
                                                                                                                           r
                                                           r   t                                   Customer
e                                                                         Customer                                         a
           Mutable              System States                  a                                 status: {New,
r                                                          v              Balance,                                         n
          Attributes               base on                     n                                    reliable,
v                                                          i               Trust,                                          t
                                  attributes                   t                                  Unreliable,
i                                                          c               History
                                                                                                 trustworthy}              /
c                                                          e   S
e                                                                                                                          D
                                                               t
                                                                                                                           e
                                                               r
                                                           G                                                               n
                                 Condition                     e            1.Prefer
                                                           r                                                               y
R        Application                                           a          trustworthy
                               Enforcem ent /              a                                      1.Sufficient
e        Level Policy                                          m           Customer,
                               Access Control                                                      Balance ?               S
q                                                          t                2. Prefer
                                                                                                2. More cond. ?            t
u                                                          n   R         customer with                                     r
e                                                          /   e         more balance                                      a
s                                                          D   q
                  Update M utable Attributes based Per                                                                     m
t                                                          e   u                  Update balance, history etc. based Per
                         Request Processing                                                                                i
                                                           n   e                          Request Processing               n
                                                           y   s
                                                                                                                           g
              General Enforcem ent System(each                 t
                                                                           Enforcement System for Online video
              Service request goes through this
                                                                                    Stream Provider
                          system )
    Fig 3a: General Model for continuous Enforcement                  Fig. 3b: Continuous enforcement model
                                                                       for video streaming service Provider.

    Here we assume that each request is going through the enforcement model. The model has mutable
    attributes which define the current state (and all possible states) for the system. The condition
    enforcement diamond in fig 3a. ensures that any violation of system policy will be detected and any
    further service request will be ignored in such violation cases.

    For a specific application, I have considered a video streaming service provider where each customer
    should have some balance, some trust worthiness, and/or balance history to get service. Possible state /
    status for a customer are new, reliable, unreliable etc. A future request will be allowed or denied based on
    which state the customer is currently in as well as on the policy of the system some of which are
    enumerated in figure 3b.

    References:

    [1] Jaehong Park and Ravi Sandhu. The UCON_ABC Usage Control Model, ACM Transactions on Information and
    System Security, Volume 7, Number 1, February 2004, pages 128-174.

    [2] Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In
    Proceedings 5th International Conference on Availability, Reliability and Security (ARES)

          I have not taken any help on this examination from anybody and have not given any help to
                                                  anybody.
4. The Good Part and Bad Part:

In this paper the authors have nicely identified the scope of their work by identifying the fact that
although there exists de-facto standard for confidentiality and integrity for online banking, there is no
standard scheme for authentication and non-repudiation. Then they presented two solutions for achieving
authentication and non-repudiation. While they have engineered fairly technical solutions, the way they
have presented them is not quite comprehensible and the article would have required more technical
representation and technical analysis of their claim. For example, their approach for certificate-based
solution should be more distinct in the sense what already exists and what they are proposing. The authors
should have also shown attack scenarios that are possible in existing approached but not possible when
their proposed solution is deployed.

Something I have learned from the paper:

In order to protect man-in-the-middle (MITM) attack, this paper has proposed a short time password
scheme based on hardware generated token. Eventually, they have transferred the defense against secret
key tampering on an offline hardwired device (smart card) which is interesting to learn. I have also come
to know about the security concern and measurements for online banking ( for both online & offline )
from this and other papers I have read for answering the question.

Weakness of the paper:

The authors have identified and provided solution for issues like authentication, confidentiality, Integrity
and non-repudiation. But today there exists more sophisticated attack than MITM or SSL certificate
tempering among which MITB (Man-in-the-Browser) is worth to mention. So, they did not cover these
types of client browser specific attacks (ex: XSS, XSRF and many others) although they have brought up
this issues in another paper[4]. It is also reported that [3] a special, dedicated hardware device like smart
card and card reader(additionally other equipments) for online banking may potentially hurt customer
experiences caused by the limited portability of the hardware device.

References:

[1] Read the paper: Hiltgen, A., Kramp, T. and Weigold, T., “Secure Internet banking authentication.” IEEE
Security & Privacy, vol.4, no.2, pp.21-29, March-April 2006.

[2] Shoji Sakurai, Shinobu Ushirozawa, "Input Method against Trojan Horse and Replay Attack "Information
Theory and Information Security (ICmS), pp.3S4-3S9, Jan 2010.

[3] A. Vapen and N. Shahmehri. “Security levels for web authentication using mobile phones.” PrimeLife/IFIP
Summer School Post-proceedings, Springer, 2011 (In Press).

[4] Oppliger, R.; Rytz, R.; Holderegger, T.; “Internet Banking: Client-Side Attacks and Protection Mechanisms.”
Computer (IEEE), 2009, Vol. 42 , No. 6, pp. 27-33.

      I have not taken any help on this examination from anybody and have not given any help to
                                              anybody.

Contenu connexe

Tendances

Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 

Tendances (14)

7.Wireless
7.Wireless7.Wireless
7.Wireless
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
I0362048053
I0362048053I0362048053
I0362048053
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ks3618311836
Ks3618311836Ks3618311836
Ks3618311836
 
Amcaas Beamforming
Amcaas BeamformingAmcaas Beamforming
Amcaas Beamforming
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
Bl32401409
Bl32401409Bl32401409
Bl32401409
 
D0511924
D0511924D0511924
D0511924
 

En vedette

En vedette (6)

Recitation
RecitationRecitation
Recitation
 
Branch prediction contest_report
Branch prediction contest_reportBranch prediction contest_report
Branch prediction contest_report
 
Recitation
RecitationRecitation
Recitation
 
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionTranscription Factor DNA Binding Prediction
Transcription Factor DNA Binding Prediction
 
Ksi
KsiKsi
Ksi
 
Attribute Based Encryption
Attribute Based EncryptionAttribute Based Encryption
Attribute Based Encryption
 

Similaire à Difference between covert and side channels

IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET Journal
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSijsptm
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using WaveletIRJET Journal
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
 
Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged byijcsit
 
T tmac energy aware sensor mac protocol for
T tmac energy aware sensor mac protocol forT tmac energy aware sensor mac protocol for
T tmac energy aware sensor mac protocol forNabil Kolta
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Publishing House
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletseSAT Journals
 
Jaringan Adhoc
Jaringan AdhocJaringan Adhoc
Jaringan Adhoccorcrash
 
Design of a rectangular patch antenna
Design of a rectangular patch antennaDesign of a rectangular patch antenna
Design of a rectangular patch antennaAzlin lolin
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 

Similaire à Difference between covert and side channels (20)

IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
J0525460
J0525460J0525460
J0525460
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
W4301117121
W4301117121W4301117121
W4301117121
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
 
Square grid points coveraged by
Square grid points coveraged bySquare grid points coveraged by
Square grid points coveraged by
 
T tmac energy aware sensor mac protocol for
T tmac energy aware sensor mac protocol forT tmac energy aware sensor mac protocol for
T tmac energy aware sensor mac protocol for
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
sanju
sanjusanju
sanju
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded waveletsNon standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
 
K42016368
K42016368K42016368
K42016368
 
Jaringan Adhoc
Jaringan AdhocJaringan Adhoc
Jaringan Adhoc
 
Design of a rectangular patch antenna
Design of a rectangular patch antennaDesign of a rectangular patch antenna
Design of a rectangular patch antenna
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 

Plus de UT, San Antonio

digital certificate - types and formats
digital certificate - types and formatsdigital certificate - types and formats
digital certificate - types and formatsUT, San Antonio
 
Static Analysis with Sonarlint
Static Analysis with SonarlintStatic Analysis with Sonarlint
Static Analysis with SonarlintUT, San Antonio
 
Shellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityShellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityUT, San Antonio
 
Big Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationBig Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationUT, San Antonio
 
Enumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelEnumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelUT, San Antonio
 
Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)UT, San Antonio
 
Security_of_openstack_keystone
Security_of_openstack_keystoneSecurity_of_openstack_keystone
Security_of_openstack_keystoneUT, San Antonio
 
Research seminar group_1_prosunjit
Research seminar group_1_prosunjitResearch seminar group_1_prosunjit
Research seminar group_1_prosunjitUT, San Antonio
 
Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction UT, San Antonio
 
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionTranscription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionUT, San Antonio
 
On the incoherencies in web browser access control
On the incoherencies in web browser access controlOn the incoherencies in web browser access control
On the incoherencies in web browser access controlUT, San Antonio
 

Plus de UT, San Antonio (20)

digital certificate - types and formats
digital certificate - types and formatsdigital certificate - types and formats
digital certificate - types and formats
 
Saml metadata
Saml metadataSaml metadata
Saml metadata
 
Static Analysis with Sonarlint
Static Analysis with SonarlintStatic Analysis with Sonarlint
Static Analysis with Sonarlint
 
Shellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerabilityShellshock- from bug towards vulnerability
Shellshock- from bug towards vulnerability
 
Abac17 prosun-slides
Abac17 prosun-slidesAbac17 prosun-slides
Abac17 prosun-slides
 
Abac17 prosun-slides
Abac17 prosun-slidesAbac17 prosun-slides
Abac17 prosun-slides
 
Big Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory ComputationBig Data Processing: Performance Gain Through In-Memory Computation
Big Data Processing: Performance Gain Through In-Memory Computation
 
Enumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) modelEnumerated authorization policy ABAC (EP-ABAC) model
Enumerated authorization policy ABAC (EP-ABAC) model
 
Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)Where is my Privacy presentation slideshow (one page only)
Where is my Privacy presentation slideshow (one page only)
 
Three month course
Three month courseThree month course
Three month course
 
One month-syllabus
One month-syllabusOne month-syllabus
One month-syllabus
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
Security_of_openstack_keystone
Security_of_openstack_keystoneSecurity_of_openstack_keystone
Security_of_openstack_keystone
 
Research seminar group_1_prosunjit
Research seminar group_1_prosunjitResearch seminar group_1_prosunjit
Research seminar group_1_prosunjit
 
Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction Final Project Transciption Factor DNA binding Prediction
Final Project Transciption Factor DNA binding Prediction
 
Transcription Factor DNA Binding Prediction
Transcription Factor DNA Binding PredictionTranscription Factor DNA Binding Prediction
Transcription Factor DNA Binding Prediction
 
Secure webbrowsing 1
Secure webbrowsing 1Secure webbrowsing 1
Secure webbrowsing 1
 
On the incoherencies in web browser access control
On the incoherencies in web browser access controlOn the incoherencies in web browser access control
On the incoherencies in web browser access control
 
Cultural conflict
Cultural conflictCultural conflict
Cultural conflict
 
Pair programming
Pair programmingPair programming
Pair programming
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Difference between covert and side channels

  • 1. Submitted By: Prosunjit Biswas (@01232785) 1. Difference between Covert Channel & Side Channel: In the simplest definition, ‘A communication channel is covert if it is neither designed nor intended to transfer information at all’ [1]. A more compelling definition appears as – ‘Given a security model M and its interpretation I(M) in an operating system and any potential communication between two subjects I(Sh) and I(Si) of ((M) is covert only if the communication between the subjects Sh and Si of the model of M is illegal in M’ [2]. On the other hand, “Side channel leaks S Subjects implementation-specific characteristics to S i d i recover the secret parameters involved in d e e the computation and specific to given C C implementation.”[3] Figure 1. shows the h h a …….. : a position of covert channel and side n convert n channel n channel in a system. n e Projection Model e l l Fig 1: Side channel & Covert channel. Environment Side Effect (Heat, Sound, Power etc) i) Covert channel is created inside a protection model where either that channel was not identified or not intended for communication where as side channel stays outside the protection model based on the side effect of the model with the environment (ex: electromagnetic emission). ii) Covert channel may require cooperating sender and receiver where as side channel do not require sender. Conversion between Covert channel and Side channel: As shown in figure 1b, we can convert side- channel into covert channel and vice versa. M We see that for model M1, C1 is side channel o Information Leaking d because it stays outside the model but if we C1 Side channel for M1 / Covert channel for M2 e build another protection model M2 including l Protection M1, then C1 becomes the Covert channel for M Model (M1) M2 by leaking information from a subject in M1 2 to other subject outside m1. Thus by changing the protection model from M1 to M2 we can convert between side channel into covert channel. Similarly, we can do the opposite. Fig 1b: Conversion between side & Covert Channel References: [1] B.W. Lampson, "A Noto on the Confinement Problem," Communications ACM 16 (1973). 613-615. [2] C. Tsai and V. D. Gligor, "A Bandwidth Computation Model for Covert Storage Channels and its Applications," IEEE Symposium on Security and Privacy, 1988. [3] F.-X. Standaert. Introduction to side-channel attacks. In I. M. Verbauwhede, Secure Integrated Circuit.2009 I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 2. 2. Intrusion Detection & Intrusion Prevention System: Although both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) analyze the traffic and work based on different predefined rules, there are fundamental differences on how data they work and on action they can take. Figure 2. Shows the scope of both system in some great details. Fig 2: Breakdown of Intrusion Detection and Intrusion Prevention System Differences: i) IPS works with real traffic which means that the traffic, if allowed, is feed to real devices where as IDS works with the copy of the data, in the sense that even if we have IDS setup to update firewall with blocking rules, the initial attack packet has already gone through. ii) IDS is a passive device only used for loging/reporting purpose where as IPS acts as an active device which can terminate network connection or user sessions based on the need of IPS system. Implications of Base-rate fallacy on IPS: Similar to the base-rate fallacy in IDS, IPS effectiveness depends on how we can improve false alarm rate. If we use an IPS with high false alarm rate, eventually it will hurt system performance badly by filtering / stopping legitimate traffic. So, the impact of base rate fallacy on IPS is much more critical than its impact on IDS. Reference: [1] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of the 6th ACM Conference on Cornpurer and Communications Securiry,1999. [2] “IDS vs IPS”, available at : http://blog.inetu.net/2011/02/intrusion-detection-or-prevention-ids-vs-ips/ [3] “IDS vs IPS”, available at : http://www.focus.com/fyi/ids-vs-ips/ I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 3. 3. Continuous enforcement ensures that the control on a resource stays even after access to that resource is given to a user. Thus, it is required to monitor consumption of the resource or subsequent request for consumption so that it does not violate the policy under which access was granted. In the following model, I am not considering how the resource is consumed which is very inflexible to monitor in real situation. This model tries to provide continuous enforcement where continuous requests for a resource are made and each request has some side effect in the system. Fig. 3a. gives a general model for continuous enforcement while fig. 3b is specialized model for video streaming service provider. I S n G S e s r r t Customer e Customer a Mutable System States a status: {New, r v Balance, n Attributes base on n reliable, v i Trust, t attributes t Unreliable, i c History trustworthy} / c e S e D t e r G n Condition e 1.Prefer r y R Application a trustworthy Enforcem ent / a 1.Sufficient e Level Policy m Customer, Access Control Balance ? S q t 2. Prefer 2. More cond. ? t u n R customer with r e / e more balance a s D q Update M utable Attributes based Per m t e u Update balance, history etc. based Per Request Processing i n e Request Processing n y s g General Enforcem ent System(each t Enforcement System for Online video Service request goes through this Stream Provider system ) Fig 3a: General Model for continuous Enforcement Fig. 3b: Continuous enforcement model for video streaming service Provider. Here we assume that each request is going through the enforcement model. The model has mutable attributes which define the current state (and all possible states) for the system. The condition enforcement diamond in fig 3a. ensures that any violation of system policy will be detected and any further service request will be ignored in such violation cases. For a specific application, I have considered a video streaming service provider where each customer should have some balance, some trust worthiness, and/or balance history to get service. Possible state / status for a customer are new, reliable, unreliable etc. A future request will be allowed or denied based on which state the customer is currently in as well as on the policy of the system some of which are enumerated in figure 3b. References: [1] Jaehong Park and Ravi Sandhu. The UCON_ABC Usage Control Model, ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004, pages 128-174. [2] Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In Proceedings 5th International Conference on Availability, Reliability and Security (ARES) I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 4. 4. The Good Part and Bad Part: In this paper the authors have nicely identified the scope of their work by identifying the fact that although there exists de-facto standard for confidentiality and integrity for online banking, there is no standard scheme for authentication and non-repudiation. Then they presented two solutions for achieving authentication and non-repudiation. While they have engineered fairly technical solutions, the way they have presented them is not quite comprehensible and the article would have required more technical representation and technical analysis of their claim. For example, their approach for certificate-based solution should be more distinct in the sense what already exists and what they are proposing. The authors should have also shown attack scenarios that are possible in existing approached but not possible when their proposed solution is deployed. Something I have learned from the paper: In order to protect man-in-the-middle (MITM) attack, this paper has proposed a short time password scheme based on hardware generated token. Eventually, they have transferred the defense against secret key tampering on an offline hardwired device (smart card) which is interesting to learn. I have also come to know about the security concern and measurements for online banking ( for both online & offline ) from this and other papers I have read for answering the question. Weakness of the paper: The authors have identified and provided solution for issues like authentication, confidentiality, Integrity and non-repudiation. But today there exists more sophisticated attack than MITM or SSL certificate tempering among which MITB (Man-in-the-Browser) is worth to mention. So, they did not cover these types of client browser specific attacks (ex: XSS, XSRF and many others) although they have brought up this issues in another paper[4]. It is also reported that [3] a special, dedicated hardware device like smart card and card reader(additionally other equipments) for online banking may potentially hurt customer experiences caused by the limited portability of the hardware device. References: [1] Read the paper: Hiltgen, A., Kramp, T. and Weigold, T., “Secure Internet banking authentication.” IEEE Security & Privacy, vol.4, no.2, pp.21-29, March-April 2006. [2] Shoji Sakurai, Shinobu Ushirozawa, "Input Method against Trojan Horse and Replay Attack "Information Theory and Information Security (ICmS), pp.3S4-3S9, Jan 2010. [3] A. Vapen and N. Shahmehri. “Security levels for web authentication using mobile phones.” PrimeLife/IFIP Summer School Post-proceedings, Springer, 2011 (In Press). [4] Oppliger, R.; Rytz, R.; Holderegger, T.; “Internet Banking: Client-Side Attacks and Protection Mechanisms.” Computer (IEEE), 2009, Vol. 42 , No. 6, pp. 27-33. I have not taken any help on this examination from anybody and have not given any help to anybody.