Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Beyond Word-Based Model Embeddings: Contextualized Representations for Enhanced Social Media Spam Detection

S Alshattnawi, A Shatnawi, AMR AlSobeh… - Applied Sciences, 2024 - mdpi.com
As social media platforms continue their exponential growth, so do the threats targeting their
security. Detecting disguised spam messages poses an immense challenge owing to the …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

A novel convolutional adversarial framework for multivariate time series anomaly detection and explanation in cloud environment

P Wen, Z Yang, L Wu, S Qi, J Chen, P Chen - Applied Sciences, 2022 - mdpi.com
Anomaly detection is critical to ensure cloud infrastructures' quality of service. However, due
to the complexity of inconspicuous (indistinct) anomalies, high dynamicity, and the lack of …

Robust authentication for automotive control networks through covert channels

S Vanderhallen, J Van Bulck, F Piessens… - Computer Networks, 2021 - Elsevier
Automotive control networks offer little resistance against security threats that come with the
long-range connectivity in modern cars. Remote attacks that undermine the safety of …

[HTML][HTML] Network Covert Channels

M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …

A deep learning approach for detecting covert timing channel attacks using sequential data

S Al-Eidi, O Darwish, Y Chen, M Maabreh… - Cluster …, 2024 - Springer
The advanced development of communication technologies has made covert
communications quite challenging to be recognized. By altering an entity's timing behavior …

HTTP cookie covert channel detection based on session flow interaction features

W Yuan, X Chen, Y Zhu, X Zeng… - Security and …, 2023 - Wiley Online Library
HTTP cookie covert channel is a covert communication method that encodes malicious
information in cookie fields to escape regulatory audits. It is difficult to detect this kind of …

A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence

J Walatkiewicz, O Darwish - International Conference on Advances in …, 2023 - Springer
Recreational and commercial drones are becoming more common in the United States and
globally. As of 2020, recreational drones registered with the Federal Aviation Association …

Convolutional neural network structure to detect and localize ctc using image processing

S Al-Eidi, O Darwish, G Husari, Y Chen… - … IEEE International IOT …, 2022 - ieeexplore.ieee.org
Many cybersecurity attacks utilize Covert Timing Channels as a method to secretly transmit
(steal) sensitive information from target networks such as untrusted Internet of Things (IoT) …