泛在网络环境下隐蔽通道关键技术研究综述

李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …

Covert timing channel detection method based on time interval and payload length analysis

J Han, C Huang, F Shi, J Liu - Computers & Security, 2020 - Elsevier
Abstract Information leakage is becoming increasingly serious in today's network
environment. Faced with increasingly forceful network defence strategies, attackers are also …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Learning autoencoder ensembles for detecting malware hidden communications in IoT ecosystems

N Cassavia, L Caviglione, M Guarascio… - Journal of Intelligent …, 2024 - Springer
Modern IoT ecosystems are the preferred target of threat actors wanting to incorporate
resource-constrained devices within a botnet or leak sensitive information. A major research …

[HTML][HTML] Network Covert Channels

M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …

Generic and sensitive anomaly detection of network covert timing channels

H Li, T Song, Y Yang - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate
attacks and propagate malwares, posing serious threats to cybersecurity. Current covert …

Covert timing channel analysis either as cyber attacks or confidential applications

S Al-Eidi, O Darwish, Y Chen - Sensors, 2020 - mdpi.com
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …

A deep learning approach for detecting covert timing channel attacks using sequential data

S Al-Eidi, O Darwish, Y Chen, M Maabreh… - Cluster …, 2024 - Springer
The advanced development of communication technologies has made covert
communications quite challenging to be recognized. By altering an entity's timing behavior …

Detection of covert timing channel based on time series symbolization

S Wu, Y Chen, H Tian, C Sun - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
Covert Timing Channels (CTCs) is a technique to leak information. CTCs only modify inter-
arrival time sequence (IATs) between packets, consequently, traditional network security …

Topology and size optimization for a flexure hinge using an integration of SIMP, deep artificial neural network, and water cycle algorithm

N Le Chau, NT Tran, TP Dao - Applied Soft Computing, 2021 - Elsevier
This paper develops a multistage optimization method for designing a new flexure hinge
(FH). The proposed method is a combination of the topology optimization, the deep artificial …