Results 261 to 270 of about 28,210 (305)
Some of the next articles are maybe not open access.

Detecting Hardware Covert Timing Channels

IEEE Micro, 2016
Information security and data privacy have steadily grown into major concerns in computing, especially given the rapid transition into the digital age for all needs--from healthcare to national defense. Among the many forms of information leakage, covert timing channels can be dangerous primarily because they involve two parties intentionally colluding
Guru Venkataramani   +2 more
openaire   +1 more source

Detecting covert channels within VoIP

2012 35th IEEE Sarnoff Symposium, 2012
VoIP (Voice Over IP) was ranked third among the top 11 technologies of the decade in 2011. It is one of the most popular networking services. As it is readily adopted, the VoIP traffic is increasing steadily. The large amount of data transported by VoIP makes it ideal for creating covert channels.
Hong Zhao, Nirwan Ansari
openaire   +1 more source

Covert Channel Detection Techniques in Cloud

Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013
This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. This is an active research area whereby many security frameworks have been proposed for isolating VMs, but still covert channels in commercial clouds exist.
M. Alam, S. Sethi, S. Sethi
openaire   +1 more source

Run-time detection of covert channels

First International Conference on Availability, Reliability and Security (ARES'06), 2006
The authors are interested in the characterization of policies which are enforced by execution monitoring mechanisms with an extra structure that is an extension of Schneider's enforcement mechanism. This paper is a starting point for continuing in this area.
N. Nagatou, T. Watanabe
openaire   +1 more source

Automatic Detection of Storage-Based Covert Channels

2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), 2021
Network packets can be used to hide information in space or in time, a steganographic technique known as a covert channel. Steganalysis is the science of finding the presence of covert channels. Re-embedding steganalysis has been shown to be effective in detecting both the presence and the amount of hidden information.
Jun O Seo   +2 more
openaire   +1 more source

Collaborative detection of Covert Storage Channels

MILCOM 2016 - 2016 IEEE Military Communications Conference, 2016
This paper describes a new collaborative approach to detect two different types of Covert Storage Channels (CSCs) that utilize TCP flag and packet sequence number in network packets. Tested in Software-defined networking (SDN), a multistage detection mechanism coordinates monitors, correlators and SDN controllers to first quickly alert traffic ...
null Heng Song, null Xiangyang Li
openaire   +1 more source

Covert channel detection in VoIP streams

2011 45th Annual Conference on Information Sciences and Systems, 2011
This paper presents two approaches to detect VoIP covert channel communications using compressed versions of the data packets. The approach is based on specialized random projection matrices that take advantage of prior knowledge about the normal traffic structure.
Gonzalo Garateguy   +2 more
openaire   +1 more source

Detecting DNS covert channels using stacking model

China Communications, 2020
A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies. The DNS protocol is one of the important ways to implement a covert channel. DNS covert channels are easily used by attackers for malicious purposes.
Peng Yang, Ye Li, Yunze Zang
openaire   +1 more source

Covert channel detection: A survey based analysis

High Capacity Optical Networks and Emerging/Enabling Technologies, 2012
Secret communication via network has always been an area of interest for many. It has not only attracted the trusted parties to communicate with each other secretly but has also attracted the hackers/attackers to find ways to discover and leak the information and use the network in a manner that violate security policies.
S. Zerafshan Goher   +2 more
openaire   +1 more source

Packet Length Covert Channel: A Detection Scheme

2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018
A covert channel is a communication channel that is subjugated for illegal flow of information in a way that violates system security policies. It is a dangerous, invisible, undetectable, and developed security attack. Recently, Packet length covert channel has motivated many researchers as it is a one of the most undetectable network covert channels ...
Muawia A. Elsadig, Yahia A. Fadlalla
openaire   +1 more source

Home - About - Disclaimer - Privacy