Results 21 to 30 of about 28,210 (305)

Covert communications with channel inversion power control in uplink NOMA systems

open access: yesElectronics Letters, 2021
Covert communications hide the very existence of wireless transmissions and thus can address privacy and security issues in non‐orthogonal multiple access (NOMA) systems.
Maochun Wang   +5 more
doaj   +1 more source

Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network

open access: yesIEEE Open Journal of the Computer Society, 2021
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security.
Chonggao Sun   +3 more
doaj   +1 more source

Covert Channel Construction Method Based on HTTP Composite Protocols

open access: yesJournal of Electrical and Computer Engineering, 2022
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol ...
Longxing Jin   +4 more
doaj   +1 more source

An Xgboost-based Method for Detecting Covert Timing Channel of Skype [PDF]

open access: yesJisuanji gongcheng, 2021
The covert timing channel exploits the packet delay to transmit secret information.Due to the complexity of the temporal features of network,the false alarm rate of the covert channels is high,masking the detection of the true targets.An Xgboost-based ...
CHANG Tingting, ZHAI Jiangtao, DAI Yuewei
doaj   +1 more source

Survey on key technologies of covert channel in ubiquitous network environment

open access: yesTongxin xuebao, 2022
In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The ...
Fenghua LI   +5 more
doaj   +2 more sources

Multi‐antenna joint covert communication with a public communication link over wireless fading channel

open access: yesIET Communications, 2021
This paper studies multi‐antenna covert communication exploiting a public communication link over the wireless fading channel. In particular, a relatively practical covert communication scenario is considered for the first time, where a warden with ...
Yuda Lin   +3 more
doaj   +1 more source

Bandwidth and detection of packet length covert channels

open access: green, 2011
This thesis explores the detectability and robustness of packet length covert channels. We discovered that packet length covert channels, where a rogue user modulates the length of a Transport Control Protocol packet, can be detected while monitoring traffic of a large network.
Derek J. Dye
openaire   +3 more sources

Covert timing channel detection based on isolated binary trees

open access: greenComputers & Security
Yuwei Lin   +3 more
openaire   +2 more sources

Fundamental limits of quantum-secure covert optical sensing [PDF]

open access: yes, 2017
We present a square root law for active sensing of phase $\theta$ of a single pixel using optical probes that pass through a single-mode lossy thermal-noise bosonic channel.
Bash, Boulat A.   +3 more
core   +1 more source

TCP covert timing channels: Design and detection [PDF]

open access: yes2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), 2008
Exploiting packetspsila timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them embed covert information in the inter-packet delay. These channels, however, can be detected based on the perturbed traffic pattern, and their decoding accuracy could be ...
null Xiapu Luo   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy