%0 Conference Proceedings %T CSP-Based General Detection Model of Network Covert Storage Channels %+ Xidian University %A Zhu, Hui %A Liu, Tingting %A Wei, Guanghui %A Liu, Beishui %A Li, Hui %Z Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 459-468 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_51 %K Security modeling %K Protocol analysis %K Network covert storage channels %K Detection %K CSP %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X A network covert channel is a malicious conversation mechanism, which brings serious security threat to security-sensitive systems and is usually difficult to be detected. Data are hidden in the header fields of protocols in network covert storage channels. In this paper, a general detection model based on formal protocol analysis for identifying possible header fields in network protocols that may be used as covert storage channels is proposed. The protocol is modeled utilizing the Communication Sequential Processes (CSP), in which a modified property of header fields is defined and the header fields are classified into three types in accordance to the extent to which their content can be altered without impairing the communication. At last, verification of the model in Transmission Control Protocol (TCP) shows that the proposed method is effective and feasible. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480205/document %2 https://inria.hal.science/hal-01480205/file/978-3-642-36818-9_51_Chapter.pdf %L hal-01480205 %U https://inria.hal.science/hal-01480205 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804