Show simple item record

dc.contributor.authorSingh, Abhishek
dc.date.accessioned2005-03-17T20:47:40Z
dc.date.available2005-03-17T20:47:40Z
dc.date.issued2004
dc.identifier.urihttp://hdl.handle.net/1853/5917
dc.description.abstractPrevention of malicious communication channel has been an important issue in building secure networked systems. Malicious Communication channel can be established by using header fields which follow particular semantics or by using data fields, which do not follow any particular semantics. There have been many research directions to prevent the malicious flow of information in the header fields. This paper presents the design of a system which has been designed to prevent he malicious covert channel using data fields. The proposed system consists of two parts. The first part is an E-Firewall. The E-firewall runs on the end hosts, while the eraser runs at the Gateway. Eraser is a rule or policy based system, which checks for the malicious content in the payload. Besides storing the test metrics of the applications, the E-Firewall also stores the dependencies amongst the applications. This storage of dependencies offers incremental advantage over the existing firewall by providing information about the flow of information amongst the applications inside the E-firewall.en
dc.format.extent176962 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.publisherGeorgia Institute of Technologyen
dc.relation.ispartofseriesCRECS;GIT-CERCS-04-28
dc.subjectFirewallsen
dc.subjectE-firewallen
dc.subjectMalicious communication channelen
dc.subjectData fieldsen
dc.subjectPolicy based systemsen
dc.subjectEraseren
dc.titleEraser: An Exploit - Specific Monitor to Prevent Malicious Communication Channelen
dc.typeTechnical Reporten


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record