Results 1 to 10 of about 28,040 (173)
Covert channel detection using Information Theory [PDF]
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core +7 more sources
Detection of Covert Channels Over ICMP Protocol [PDF]
With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection ...
Sayadi, Sirine +2 more
openaire +4 more sources
Covert Channel Detection: Machine Learning Approaches [PDF]
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever. A covert channel is a path through which secret messages can be leaked by violating a system security policy. The detection of such dangerous, unwatchable, and hidden threats is
Muawia A. Elsadig, Ahmed Gafar
openaire +3 more sources
Covert Channel Detection Using Machine Learning
A covert channel is a communication method that misuses legitimate resources to bypass intrusion detection systems. They can be used to do illegal work like leaking classified (or sensitive) data or sending commands to malware bots. Network timing channels are a type of these channels that use inter-arrival times between network packets to encode the ...
İmge Gamze Çavuşo˘glu +2 more
openaire +3 more sources
A framework for network covert channel detection
Since the dawn of human communications, there have been people that have wished to correspond secretly with others. Some people have desired the content of their communication to be kept confidential; some wish the very fact that they are communicating to remain unknown.
Josiah Dykstra
openaire +5 more sources
Detection of DNS based covert channels [PDF]
Information theft or data exfiltration, whether personal or corporate, is now a lucrative mainstay of cybercrime activity. Recent security reports have suggested that while information, such as credit card data is still a prime target, other data such as corporate secrets, employee files and intellectual property are increasingly sought after on the ...
Sheridan, Stephen, Keane, Anthony
openaire +3 more sources
Detection of communication over DNSSEC covert channels
Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant and escalating battle with the writers of malware and other methods of network intrusion to detect and mitigate this threat.
Nicole M. Hands
openaire +3 more sources
Characterization and Detection of Cross-Router Covert Channels
Oren Shvartzman +7 more
openaire +2 more sources
Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core +1 more source

