Results 21 to 30 of about 28,210 (305)
Covert communications with channel inversion power control in uplink NOMA systems
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang +5 more
doaj +1 more source
Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun +3 more
doaj +1 more source
Covert Channel Construction Method Based on HTTP Composite Protocols
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol ...
Longxing Jin +4 more
doaj +1 more source
An Xgboost-based Method for Detecting Covert Timing Channel of Skype [PDF]
The covert timing channel exploits the packet delay to transmit secret information.Due to the complexity of the temporal features of network,the false alarm rate of the covert channels is high,masking the detection of the true targets.An Xgboost-based ...
CHANG Tingting, ZHAI Jiangtao, DAI Yuewei
doaj +1 more source
Survey on key technologies of covert channel in ubiquitous network environment
In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The ...
Fenghua LI +5 more
doaj +2 more sources
This paper studies multi‐antenna covert communication exploiting a public communication link over the wireless fading channel. In particular, a relatively practical covert communication scenario is considered for the first time, where a warden with ...
Yuda Lin +3 more
doaj +1 more source
Bandwidth and detection of packet length covert channels
This thesis explores the detectability and robustness of packet length covert channels. We discovered that packet length covert channels, where a rogue user modulates the length of a Transport Control Protocol packet, can be detected while monitoring traffic of a large network.
Derek J. Dye
openaire +3 more sources
Covert timing channel detection based on isolated binary trees
Yuwei Lin +3 more
openaire +2 more sources
Fundamental limits of quantum-secure covert optical sensing [PDF]
We present a square root law for active sensing of phase $\theta$ of a single pixel using optical probes that pass through a single-mode lossy thermal-noise bosonic channel.
Bash, Boulat A. +3 more
core +1 more source
TCP covert timing channels: Design and detection [PDF]
Exploiting packetspsila timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them embed covert information in the inter-packet delay. These channels, however, can be detected based on the perturbed traffic pattern, and their decoding accuracy could be ...
null Xiapu Luo +2 more
openaire +1 more source

