Results 271 to 280 of about 28,210 (305)
Some of the next articles are maybe not open access.
Artificial Intelligence to Detect Timing Covert Channels
2019The peculiarities of the batch data transmission networks make it possible to use covert channels, which survive under standard protective measures, to perform data leaks. However, storage covert channels can be annihilated by means of limiting the flow capacity, or by use of encryption.
Aleksandra Yazykova +2 more
openaire +1 more source
Detecting Covert Channels in FPS Online Games
2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly.
openaire +1 more source
Detection of Covert Channels in TCP Retransmissions
2018In this paper we describe the implementation and detection of a network covert channel based on TCP retransmissions. For the detection, we implemented and evaluated two statistical detection measures that were originally designed for inter-arrival time-based covert channels, namely the \(\epsilon \)-similarity and the compressibility. The \(\varepsilon
Sebastian Zillien, Steffen Wendzel
openaire +1 more source
Covert Channel Detection Methods
2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), 2022Adrian Ondov, Pavol Helebrandt
openaire +1 more source
Detection of TCP covert channel based on Markov model
Telecommunication Systems, 2012Network covert channel is a covert communication method by hiding covert messages into overt network packets. In recent years, with the development of various hiding methods, network covert channel has become a new kind of threat for network security.
Jiangtao Zhai - +2 more
openaire +1 more source
Detecting covert communication channels in raster images
2014Digital image steganography is a method for hiding secret messages within everyday Internet communication channels. Such covert communications provide protection for communications and exploit the opportunities available in digital media. Digital image steganography makes the nature and content of a message invisible to other users by taking ordinary ...
Cusack, Brian, Chambers, Jarrett
openaire +1 more source
Web Covert Timing Channels Detection based on Entropy
2019 5th International Conference on Web Research (ICWR), 2019Todays analyzing web weaknesses and vulnerabilities in order to find security attacks has become more urgent. In case there is a communication contrary to the system security policies, a covert channel has been created. The attacker can easily disclosure information from the victim’s system with just one public access permission. Covert timing channels,
Mehrdad Nasseralfoghara +1 more
openaire +1 more source
Timing Covert Channels Detection Cases via Machine Learning
2019 European Intelligence and Security Informatics Conference (EISIC), 2019Currently, packet data networks are widespread. Their architectural features allow constructing covert channels that are able to transmit covert data under the conditions of using standard protection measures. However, encryption or packets length normalization, leave the possibility for an intruder to transfer covert data via timing covert channels ...
Anna Epishkina +3 more
openaire +1 more source
On the Statistical Detectability of Covert Timing Channels
2023Covert channels are methods to secretly convey information across communication networks by exploiting the characteristics of communication protocols in unexpected ways. Covert channels are computer attacks primarily used by malware or other illicit activities.
openaire +1 more source
Advances in TRP channel drug discovery: from target validation to clinical studies
Nature Reviews Drug Discovery, 2021Ari-Pekka Koivisto +2 more
exaly

