INFORMATION OUTPUT CHANNELS – RESEARCH AND MODELING
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1113Keywords:
information leakage channels, traffic analysis, network connections, packet interceptionAbstract
Automated systems accumulate huge amounts of data, including confidential data, which makes the issue of their security particularly relevant. Globalization has also led to the emergence of new challenges related to information protection. The characteristic features of the modern use of computer technology are the growth of the role of automated processes, increased responsibility for decisions made on their basis, the integration of information resources into large-scale databases, ensuring remote access for a large number of users, and the complication of the modes of operation of technical means. Identification, analysis, and modeling of information leakage channels, as well as the assessment of potential risks to users' information security are an important task. Therefore, the subject of research is information leakage channels that arise in the process of functioning of information and communication systems and computer equipment, in particular computer networks, web browsers, and multimedia files. Any violation of confidentiality, integrity or availability of information can cause serious consequences - from financial losses and reduced efficiency of enterprises to undermining reputation or even creating threats to national security. That is why the issues of classification of information resources, as well as the identification and analysis of possible data leakage channels are becoming particularly relevant. The purpose of the work is to analyze the methods and mechanisms of implementing information leakage channels, in particular network protocols (HTTP, DNS, TCP/UDP), automatic data transmission by browsers (cookies, referer, user-agent, session tokens), electromagnetic and acoustic channels of side radiation, as well as steganographic methods of covert transmission of messages in graphic files. The study allowed us to comprehensively investigate some information leakage channels, familiarize ourselves with the methods of their detection and assess the risks to user security.
Downloads
References
Horlichenko, S. (2023). Features of formation of technical information leakage channels from modern information and communication systems. Ukrainian Scientific Journal of Information Security, 29(2), 80–87. https://doi.org/10.18372/2225-5036.29.17872
Maltseva, I., Chernish, Y., & Shtonda, R. (2022). Analysis of some cyber threats under wartime conditions. Cybersecurity: Education, Science, Technique, 4(16), 37–44. https://doi.org/10.28925/2663-4023.2022.16.3744
HostZealot. (n.d.). How to check port availability. https://www.hostzealot.com.ua/blog/how-to/yak-pereviryty-dostupnist-portiv/
Datami. (n.d.). 19 cases of large-scale data breaches. https://datami.ee/ua/blog/19-sluchaev-masshtabnoj-utechki-dannyh/
Nym Technologies. (n.d.). What is packet sniffing? Tcpdump, Wireshark, and how your neighbor spies on you. https://nym.com/uk/blog/%D1%89%D0%BE-%D1%82%D0%B0%D0%BA%D0%B5-%D0%BF%D0%B5%D1%80%D0%B5%D1%85%D0%BE%D0%BF%D0%BB%D0%B5%D0%BD%D0%BD%D1%8F-%D0%BF%D0%B0%D0%BA%D0%B5%D1%82%D1%96%D0%B2/
National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”. (n.d.). Methods and means of technical information protection: Practical guide. https://ela.kpi.ua/items/8a9dd076-19c8-450a-93e1-c5bf18ed7820
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Юлія Черниш, Тетяна Терещенко, Катерина Терещенко

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.