Results 11 to 20 of about 28,210 (305)

Prospective approaches to detecting network covert channels

open access: yesBezopasnost informacionnyh tehnology, 2021
The purpose of this study is to analyze the existing timing covert channels detection methods. Preventive measures are often used to counteract storage covert channels, such as traffic encryption and transmitted packets length normalization. Methods, that do not affect the functioning of legitimate communication channels are more preferable in the case
Konstantin G. Kogos, Mihail A. Finoshin
openaire   +4 more sources

Detecting covert channel attacks on cyber‐physical systems

open access: yesIET Cyber-Physical Systems: Theory & Applications, 2023
Abstract Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks.
Hongwei Li, Danai Chasaki
openaire   +2 more sources

FF-MR: A DoH-Encrypted DNS Covert Channel Detection Method Based on Feature Fusion [PDF]

open access: goldApplied Sciences, 2022
In this paper, in order to accurately detect Domain Name System (DNS) covert channels based on DNS over HTTPS (DoH) encryption and to solve the problems of weak single-feature differentiation and poor performance in the existing detection methods, we ...
Yongjie Wang   +4 more
openalex   +3 more sources

Detecting DNS-based covert channel on live traffic

open access: yesTongxin xuebao, 2013
To propose an effective detection method for DNS-based covert channel,traffic characteristics were thor-oughly studied.12 features were extracted from DNS packets to distinguish covert channels from legitimate DNS queries.Statistical characteristics of these features are used as input of the machine learning classifier.Experimental results show that ...
Si-yu ZHANG   +3 more
doaj   +4 more sources

HTTP Parameter Sorting Covert Channel Detection Method Based on Markov Model [PDF]

open access: greenJisuanji gongcheng, 2020
The network covert channel is a communication channel that establishes secret message transmission between different hosts on the network by utilizing reserved,optional or undefined fields in the network protocols.HTTP protocol,as one of the most ...
SHEN Guoliang, ZHAI Jiangtao, DAI Yuewei
openalex   +2 more sources

Efficient Non-Linear Covert Channel Detection in TCP Data Streams [PDF]

open access: goldIEEE Access, 2019
Cyber-attacks are causing losses amounted to billions of dollars every year due to data breaches and Vulnerabilities. The existing tools for data leakage prevention and detection are often bypassed by using various different types of sophisticated ...
Hanaa Nafea   +4 more
openalex   +3 more sources

Detection of Covert Timing Channel Based on Time Series Symbolization [PDF]

open access: goldIEEE Open Journal of the Communications Society, 2021
Covert Timing Channels(CTCs) is a technique to leak information. CTCs only modify inter-arrival time sequence(IATs) between packets, consequently, traditional network security mechanisms, such as firewalls and proxies, can not effectively detect CTCs. If
WU Shu-hong   +3 more
openalex   +3 more sources

An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec [PDF]

open access: goldFuture Internet
The covert nature of DNS covert channels makes them a widely utilized method for data exfiltration by malicious attackers. In response to this challenge, the present study proposes a detection methodology for DNS covert channels that employs a Deep ...
Xinyu Li   +6 more
openalex   +3 more sources

Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems

open access: yesSensors, 2023
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded
Ivan Miketic   +2 more
doaj   +1 more source

COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj   +1 more source

Home - About - Disclaimer - Privacy