Towards a reliable detection of covert timing channels over real-time network traffic

F Rezaei, M Hempel, H Sharif - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …

CCgen: injecting covert channels into network traffic

F Iglesias, F Meghdouri, R Annessi… - Security and …, 2022 - Wiley Online Library
Covert channels are methods to convey information clandestinely by exploiting the inherent
capabilities of common communication protocols. They can be used to hide malware …

Network protocol covert channels: Countermeasures techniques

MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …

DAT detectors: uncovering TCP/IP covert channels by descriptive analytics

F Iglesias, R Annessi, T Zseby - Security and Communication …, 2016 - Wiley Online Library
Covert channels provide means to conceal information transfer between hosts and bypass
security barriers in communication networks. Hidden communication is of paramount …

Detecting covert timing channels using non-parametric statistical approaches

F Rezaei, M Hempel, PL Shrestha… - 2015 International …, 2015 - ieeexplore.ieee.org
Extensive availability and development of Internet applications and services open up the
opportunity for abusing network and Internet resources to distribute malicious data and leak …

The web browser factor in traffic analysis attacks

S Zhioua - Security and Communication Networks, 2015 - Wiley Online Library
Website fingerprinting is a known type of traffic analysis attacks that aims to identify which
websites are visited in encrypted traffic traces. Recent work showed that some classifiers …

Evaluation and verification of automated covert channel modeling using a real network platform

F Rezaei, M Hempel, PL Shrestha… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
In this paper we introduce and verify our Automated Covert Channel Modeling (ACCM)
framework for evaluating and modeling covert channel algorithms. This work continues our …

Automated Covert Channel Modeling over a real network platform

F Rezaei, M Hempel, SM Rakshit… - … and Mobile Computing …, 2014 - ieeexplore.ieee.org
In this paper we introduce a new approach for modeling covert channel algorithms utilizing
automated code generation and evaluation in real network environments. Our proposed …

Influence of network new media on the digital dissemination of Chinese literature

X Wu - E3S Web of Conferences, 2021 - e3s-conferences.org
The significance and value of literature itself determine the importance of literary
communication, and literary text communication contains the communication of literary value …

SACT: A new model of covert communication based on SDN

L Shi, Y Song, Z Xue, Y Liu, H Chen - Sensors, 2020 - mdpi.com
Anonymous tracking technology of network watermarking is limited by the deployment of
tracking devices in traditional network structure, resulting in poor scalability and reusability …