Improvised Convert Channel Capacity In Mls Networks
| International Journal of Computer Trends and Technology (IJCTT) | |
© - October Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-10 | ||
Year of Publication : 2013 | ||
Authors :Parimaladevi .G , S.Ranjithakumari |
Parimaladevi .G , S.Ranjithakumari"Improvised Convert Channel Capacity In Mls Networks"International Journal of Computer Trends and Technology (IJCTT),V4(10):3464-3467 October Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- Transmission of data from a lower-level system to higher-level system without response in return will be not able to be relied upon and not firm or unsafe even with acknowledgements. In order to provide safe & secured, reliable and performance through a Communication buffer, this transmits the messages to the high system and provides a controlled stream of acknowledgements to the low system. Communication buffer transmits the messages and also acknowledgement or token between two systems. When the Communication buffer gets full, the transmission could block, known as noise and transmissions of sending files get affected from the destination process to the source process. To overcome this problem, in this paper we have implemented 2 methods where the first method will remove all the acknowledgements in the Communication buffer and in the second method, Communication buffer size is increased dynamically to allow the transmission.
References -
[1] M. H. Kang, J. Froscher, and I. S. Moskowitz: Architecture for Multilevel Security Interoperability. Proc. IEEE Computer Security Application Conf., 1997.
[2] I.S. Moskowitz and A.R. Miller, “The Channel Capacity of a Certain Noisy Timing Channel,” IEEE Trans. Information Theory, vol. 38, no. 4, pp. 1,339-1,344, July 1992.
[3] J. K. Millen, “Covert channel capacity,” in Proc. IEEE Symp. Security and Privacy, 1987, pp. 60–66.
[4] J. C. Wray, “An analysis of covert timing Channels,” in Proc. IEEE Symp. Security and Privacy, 1991, vol. 0, p. 2.
[5] W. M. Hu, “Lattice scheduling and covert channels,” in Proc. IEEE Symp. Security and Privacy, 1992, pp. 52–61.
[6] I.J. Parsonese,”The Basics in Networking the Data Communication buffer,” Working paper.
[7] I.S. Moskowitz and M.H. Kang,”Covert Channels-Here to Stay?,” Proc. COMPASS ‘94, pp. 235-243, Gaithersburg, Md., 1994.
[8] M. H. Kang and I. S. Moskowitz, “A Pump for rapid, reliable, secure communication,” in Proc. ACM Conf. Computer Communication. Security, 1993, pp. 119–129.
Keywords :— Convert channel, Communication buffer, multilevel secure systems (MLS)