泛在网络环境下隐蔽通道关键技术研究综述
李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
Covert timing channel detection method based on time interval and payload length analysis
J Han, C Huang, F Shi, J Liu - Computers & Security, 2020 - Elsevier
Abstract Information leakage is becoming increasingly serious in today's network
environment. Faced with increasingly forceful network defence strategies, attackers are also …
environment. Faced with increasingly forceful network defence strategies, attackers are also …
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …
Channels (CTC) have become an imminent network security risk that continues to grow in …
Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …
resource-constrained devices within a botnet or leak sensitive information. A major research …
[HTML][HTML] Network Covert Channels
M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …
channels are now more secure, quicker to set up, harder to detect, and easier to design than …
Generic and sensitive anomaly detection of network covert timing channels
Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate
attacks and propagate malwares, posing serious threats to cybersecurity. Current covert …
attacks and propagate malwares, posing serious threats to cybersecurity. Current covert …
Covert timing channel analysis either as cyber attacks or confidential applications
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
A deep learning approach for detecting covert timing channel attacks using sequential data
The advanced development of communication technologies has made covert
communications quite challenging to be recognized. By altering an entity's timing behavior …
communications quite challenging to be recognized. By altering an entity's timing behavior …
Detection of covert timing channel based on time series symbolization
S Wu, Y Chen, H Tian, C Sun - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
Covert Timing Channels (CTCs) is a technique to leak information. CTCs only modify inter-
arrival time sequence (IATs) between packets, consequently, traditional network security …
arrival time sequence (IATs) between packets, consequently, traditional network security …
Topology and size optimization for a flexure hinge using an integration of SIMP, deep artificial neural network, and water cycle algorithm
N Le Chau, NT Tran, TP Dao - Applied Soft Computing, 2021 - Elsevier
This paper develops a multistage optimization method for designing a new flexure hinge
(FH). The proposed method is a combination of the topology optimization, the deep artificial …
(FH). The proposed method is a combination of the topology optimization, the deep artificial …