Results 261 to 270 of about 28,210 (305)
Some of the next articles are maybe not open access.
Detecting Hardware Covert Timing Channels
IEEE Micro, 2016Information security and data privacy have steadily grown into major concerns in computing, especially given the rapid transition into the digital age for all needs--from healthcare to national defense. Among the many forms of information leakage, covert timing channels can be dangerous primarily because they involve two parties intentionally colluding
Guru Venkataramani +2 more
openaire +1 more source
Detecting covert channels within VoIP
2012 35th IEEE Sarnoff Symposium, 2012VoIP (Voice Over IP) was ranked third among the top 11 technologies of the decade in 2011. It is one of the most popular networking services. As it is readily adopted, the VoIP traffic is increasing steadily. The large amount of data transported by VoIP makes it ideal for creating covert channels.
Hong Zhao, Nirwan Ansari
openaire +1 more source
Covert Channel Detection Techniques in Cloud
Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. This is an active research area whereby many security frameworks have been proposed for isolating VMs, but still covert channels in commercial clouds exist.
M. Alam, S. Sethi, S. Sethi
openaire +1 more source
Run-time detection of covert channels
First International Conference on Availability, Reliability and Security (ARES'06), 2006The authors are interested in the characterization of policies which are enforced by execution monitoring mechanisms with an extra structure that is an extension of Schneider's enforcement mechanism. This paper is a starting point for continuing in this area.
N. Nagatou, T. Watanabe
openaire +1 more source
Automatic Detection of Storage-Based Covert Channels
2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2021Network packets can be used to hide information in space or in time, a steganographic technique known as a covert channel. Steganalysis is the science of finding the presence of covert channels. Re-embedding steganalysis has been shown to be effective in detecting both the presence and the amount of hidden information.
Jun O Seo +2 more
openaire +1 more source
Collaborative detection of Covert Storage Channels
MILCOM 2016 - 2016 IEEE Military Communications Conference, 2016This paper describes a new collaborative approach to detect two different types of Covert Storage Channels (CSCs) that utilize TCP flag and packet sequence number in network packets. Tested in Software-defined networking (SDN), a multistage detection mechanism coordinates monitors, correlators and SDN controllers to first quickly alert traffic ...
null Heng Song, null Xiangyang Li
openaire +1 more source
Covert channel detection in VoIP streams
2011 45th Annual Conference on Information Sciences and Systems, 2011This paper presents two approaches to detect VoIP covert channel communications using compressed versions of the data packets. The approach is based on specialized random projection matrices that take advantage of prior knowledge about the normal traffic structure.
Gonzalo Garateguy +2 more
openaire +1 more source
Detecting DNS covert channels using stacking model
China Communications, 2020A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies. The DNS protocol is one of the important ways to implement a covert channel. DNS covert channels are easily used by attackers for malicious purposes.
Peng Yang, Ye Li, Yunze Zang
openaire +1 more source
Covert channel detection: A survey based analysis
High Capacity Optical Networks and Emerging/Enabling Technologies, 2012Secret communication via network has always been an area of interest for many. It has not only attracted the trusted parties to communicate with each other secretly but has also attracted the hackers/attackers to find ways to discover and leak the information and use the network in a manner that violate security policies.
S. Zerafshan Goher +2 more
openaire +1 more source
Packet Length Covert Channel: A Detection Scheme
2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018A covert channel is a communication channel that is subjugated for illegal flow of information in a way that violates system security policies. It is a dangerous, invisible, undetectable, and developed security attack. Recently, Packet length covert channel has motivated many researchers as it is a one of the most undetectable network covert channels ...
Muawia A. Elsadig, Yahia A. Fadlalla
openaire +1 more source

