Towards a reliable detection of covert timing channels over real-time network traffic
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …
purposes and distribution of secret and sensitive data. This process is known as Covert …
CCgen: injecting covert channels into network traffic
F Iglesias, F Meghdouri, R Annessi… - Security and …, 2022 - Wiley Online Library
Covert channels are methods to convey information clandestinely by exploiting the inherent
capabilities of common communication protocols. They can be used to hide malware …
capabilities of common communication protocols. They can be used to hide malware …
Network protocol covert channels: Countermeasures techniques
MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …
technology encourage hackers to find new ways to leak confidential information without …
DAT detectors: uncovering TCP/IP covert channels by descriptive analytics
Covert channels provide means to conceal information transfer between hosts and bypass
security barriers in communication networks. Hidden communication is of paramount …
security barriers in communication networks. Hidden communication is of paramount …
Detecting covert timing channels using non-parametric statistical approaches
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …
opportunity for abusing network and Internet resources to distribute malicious data and leak …
The web browser factor in traffic analysis attacks
S Zhioua - Security and Communication Networks, 2015 - Wiley Online Library
Website fingerprinting is a known type of traffic analysis attacks that aims to identify which
websites are visited in encrypted traffic traces. Recent work showed that some classifiers …
websites are visited in encrypted traffic traces. Recent work showed that some classifiers …
Evaluation and verification of automated covert channel modeling using a real network platform
In this paper we introduce and verify our Automated Covert Channel Modeling (ACCM)
framework for evaluating and modeling covert channel algorithms. This work continues our …
framework for evaluating and modeling covert channel algorithms. This work continues our …
Automated Covert Channel Modeling over a real network platform
In this paper we introduce a new approach for modeling covert channel algorithms utilizing
automated code generation and evaluation in real network environments. Our proposed …
automated code generation and evaluation in real network environments. Our proposed …
Influence of network new media on the digital dissemination of Chinese literature
X Wu - E3S Web of Conferences, 2021 - e3s-conferences.org
The significance and value of literature itself determine the importance of literary
communication, and literary text communication contains the communication of literary value …
communication, and literary text communication contains the communication of literary value …
SACT: A new model of covert communication based on SDN
L Shi, Y Song, Z Xue, Y Liu, H Chen - Sensors, 2020 - mdpi.com
Anonymous tracking technology of network watermarking is limited by the deployment of
tracking devices in traditional network structure, resulting in poor scalability and reusability …
tracking devices in traditional network structure, resulting in poor scalability and reusability …