Results 11 to 20 of about 28,210 (305)
Prospective approaches to detecting network covert channels
The purpose of this study is to analyze the existing timing covert channels detection methods. Preventive measures are often used to counteract storage covert channels, such as traffic encryption and transmitted packets length normalization. Methods, that do not affect the functioning of legitimate communication channels are more preferable in the case
Konstantin G. Kogos, Mihail A. Finoshin
openaire +4 more sources
Detecting covert channel attacks on cyber‐physical systems
Abstract Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks.
Hongwei Li, Danai Chasaki
openaire +2 more sources
FF-MR: A DoH-Encrypted DNS Covert Channel Detection Method Based on Feature Fusion [PDF]
In this paper, in order to accurately detect Domain Name System (DNS) covert channels based on DNS over HTTPS (DoH) encryption and to solve the problems of weak single-feature differentiation and poor performance in the existing detection methods, we ...
Yongjie Wang +4 more
openalex +3 more sources
Detecting DNS-based covert channel on live traffic
To propose an effective detection method for DNS-based covert channel,traffic characteristics were thor-oughly studied.12 features were extracted from DNS packets to distinguish covert channels from legitimate DNS queries.Statistical characteristics of these features are used as input of the machine learning classifier.Experimental results show that ...
Si-yu ZHANG +3 more
doaj +4 more sources
HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
openalex +2 more sources
Efficient Non-Linear Covert Channel Detection in TCP Data Streams [PDF]
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and Vulnerabilities. The existing tools for data leakage prevention and detection are often bypassed by using various different types of sophisticated ...
Hanaa Nafea +4 more
openalex +3 more sources
Detection of Covert Timing Channel Based on Time Series Symbolization [PDF]
Covert Timing Channels(CTCs) is a technique to leak information. CTCs only modify inter-arrival time sequence(IATs) between packets, consequently, traditional network security mechanisms, such as firewalls and proxies, can not effectively detect CTCs. If
WU Shu-hong +3 more
openalex +3 more sources
An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec [PDF]
The covert nature of DNS covert channels makes them a widely utilized method for data exfiltration by malicious attackers. In response to this challenge, the present study proposes a detection methodology for DNS covert channels that employs a Deep ...
Xinyu Li +6 more
openalex +3 more sources
Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded
Ivan Miketic +2 more
doaj +1 more source
COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj +1 more source

