Results 1 to 10 of about 28,040 (173)

Covert channel detection using Information Theory [PDF]

open access: diamondElectronic Proceedings in Theoretical Computer Science, 2010
This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels.
Hélouët, Loïc, Roumy, Aline
core   +7 more sources

Detection of Covert Channels Over ICMP Protocol [PDF]

open access: green2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection ...
Sayadi, Sirine   +2 more
openaire   +4 more sources

Covert Channel Detection: Machine Learning Approaches [PDF]

open access: goldIEEE Access, 2022
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable and more secure than ever. A covert channel is a path through which secret messages can be leaked by violating a system security policy. The detection of such dangerous, unwatchable, and hidden threats is
Muawia A. Elsadig, Ahmed Gafar
openaire   +3 more sources

Covert Channel Detection Using Machine Learning

open access: green2020 28th Signal Processing and Communications Applications Conference (SIU), 2020
A covert channel is a communication method that misuses legitimate resources to bypass intrusion detection systems. They can be used to do illegal work like leaking classified (or sensitive) data or sending commands to malware bots. Network timing channels are a type of these channels that use inter-arrival times between network packets to encode the ...
İmge Gamze Çavuşo˘glu   +2 more
openaire   +3 more sources

A framework for network covert channel detection

open access: gold, 2020
Since the dawn of human communications, there have been people that have wished to correspond secretly with others. Some people have desired the content of their communication to be kept confidential; some wish the very fact that they are communicating to remain unknown.
Josiah Dykstra
openaire   +5 more sources

Detection of DNS based covert channels [PDF]

open access: green, 2015
Information theft or data exfiltration, whether personal or corporate, is now a lucrative mainstay of cybercrime activity. Recent security reports have suggested that while information, such as credit card data is still a prime target, other data such as corporate secrets, employee files and intellectual property are increasingly sought after on the ...
Sheridan, Stephen, Keane, Anthony
openaire   +3 more sources

Detection of communication over DNSSEC covert channels

open access: green, 2016
Unauthorized data removal and modification from information systems represents a major and formidable threat in modern computing. Security researchers are engaged in a constant and escalating battle with the writers of malware and other methods of network intrusion to detect and mitigate this threat.
Nicole M. Hands
openaire   +3 more sources

Characterization and Detection of Cross-Router Covert Channels

open access: hybridComputers & Security, 2023
Oren Shvartzman   +7 more
openaire   +2 more sources

Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6 [PDF]

open access: yes, 2016
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching for abnormal characteristics and malicious behavior in network communications.
Ma, X, Peytchev, E, Salih, A
core   +1 more source

Home - About - Disclaimer - Privacy