Paper
10 May 2006 Data exfiltration and covert channels
Annarita Giani, Vincent H. Berk, George V. Cybenko
Author Affiliations +
Abstract
Within an organization, the possibility of a confidential information leak ranks among the highest fears of any executive. Detecting information leaks is a challenging problem, since most organizations depend on a broad and diverse communications network. It is not always straightforward to conclude which information is leaving the organization legitimately, and which communications are malicious data exfiltrations. Sometimes it is not even possible to tell that a communication is occurring at all. The set of all possible exfiltration methods contains, at a minimum, the set of all possible information communication methods, and possibly more. This article cannot possibly cover all such methods; however, several notable examples are given, and a taxonomy of data exfiltration is developed. Such a taxonomy cannot ever be exhaustive, but at the very least can offer a framework for organizing methods and developing defenses.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Annarita Giani, Vincent H. Berk, and George V. Cybenko "Data exfiltration and covert channels", Proc. SPIE 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, 620103 (10 May 2006); https://doi.org/10.1117/12.670123
Lens.org Logo
CITATIONS
Cited by 35 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Printing

Computer security

Computing systems

Taxonomy

Data communications

Internet

Network security

RELATED CONTENT

Network systems security analysis
Proceedings of SPIE (May 14 2015)
Research on enterprise network security system
Proceedings of SPIE (May 06 2022)
Considerations and foundations for Botnet simulation
Proceedings of SPIE (April 13 2009)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)

Back to Top