By Topic

Simulation, optimisation and integration of Covert Channels, Intrusion Detection and packet filtering systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Lilia Frikha ; Ecole Supérieure des Communications de Tunis, Route Raoued km 3.5, 2083, Ariana, Tunisia ; Zouheir Trabelsi ; Sami Tabbane

In a communication network, an advanced security system should include three security processes, namely a packet filter (Firewall), an intrusion detection system (IDS), and a covert channels detection system (CCDS). The Firewall filters the incoming and outgoing network traffic. The IDS detects and stops attacks, such as denial of service (DoS) attacks. Covert channels allow individuals to communicate undetectable and exchange hidden information. A CCDS detects and stops covert channels. However, till now, security systems do not include dedicated processes for covert channel detection. In this paper we propose an optimized order regarding the execution of the three processes, and evaluate the system's performance when the LAN network is under different types of attacks. The results show that the proposed order enhances the processing time performance of the system.

Published in:

2009 Global Information Infrastructure Symposium

Date of Conference:

23-26 June 2009