Introducing MLS using the Open Source BACnet Firewall Router
19
Summary (pt. 3)
20
Related Publications
Description:
Explore a conference talk on advanced data exfiltration techniques and malicious communication methods. Delve into covert channels, protocol channels, and protocol hopping covert channels. Learn about shared resource matrices, covert flow trees, and traffic normalization. Discover micro protocol engineering approaches and status update techniques. Examine packet forwarding examples and requirements for covert channel routing. Investigate agents and drones for overlay routing. Gain insights into BACnet protection and the implementation of multi-level security using an open-source BACnet firewall router. Access related publications to further expand your knowledge on these cutting-edge cybersecurity topics.
The Future of Data Exfiltration and Malicious Communication