What is a hidden channel?

Covering channel is a type of safety attack that works outside the usual parameters associated with protocol protocols used to protect the system. In principle, this type of computer's security violation allows the data to be accessible and transferred between the processes in a way that these protocols would usually not be allowed. Identifying the presence of a hidden channel does not necessarily have to be difficult, although most violations of this type will try to imitate a legitimate operation and thus remain unzipped by safety measures. Depending on the type of computer monitoring software used to monitor the system and the presence of some shortcomings that allow the computer security, monitoring often detects something unusual about the way the data is used and eventually realizes the attack.

One of the simplest ways to understand how czievné canal work is to think of two people who leadou conversation in what they believe is a safe place. He does not know that the third party has planted the listening device in the room and captures every word they say. The device does not interfere with the exchange of information between the two sides, but allows the unauthorized side to gain access to this information and maybe use it for purposes that are not allowed either of the two speakers. In a sense, this provides a hidden channel; Access to data that would not otherwise be possible, which allows the recipient to use without permitting the owners of the accessible data.

is usually not a hidden channel of the highest quality. The need to create the smallest track and means that the bandwidth used to control the channel will be low. This in turn may mean that data capture and data transmission can be more time -consuming than that of protocols that are allowed by the system safety measures. Since the transfer rate is limited to smaller blocks of data, the transmission can be very tiring, which requires a decent amount of patience. Chances of discoveryThe hidden channel is higher, the longer it is active, so the originator of a security attack usually allows so much time to act active before closing the channel and later return to the next session.

Many security protocols designed and implemented in business and domestic computer systems since the beginning of the 21st century have the ability to note inconsistencies in the use of resources and a small amount of energy that usually generate hidden channel attacks. Assuming that the channel is left long enough to detect the safety mechanisms, the problem can usually be solved in a short period of time. This, in turn, allows the owners and operators of the system to devise additional security measures that help minimize the repetition of this type of security violation later.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?