Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Towards port-knocking authentication methods for mobile cloud computing

S Khan, M Shiraz, L Boroumand, A Gani… - Journal of Network and …, 2017 - Elsevier
Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the
widespread adoption of mobile devices and cloud services among individual and …

A novel chaos‐based encryption algorithm over TCP data packet for secure communication

Ü Çavuşoğlu, A Akgül, S Kaçar… - Security and …, 2016 - Wiley Online Library
In this article, a new algorithm that can encrypt data on TCP data segment by using a novel
chaotic random number generator was developed. First of all, dynamic analyses of the …

Analysis of the adoption of security headers in HTTP

WJ Buchanan, S Helme… - IET Information Security, 2018 - Wiley Online Library
With the increase in the number of threats within web‐based systems, a more integrated
approach is required to ensure the enforcement of security policies from the server to the …

Building covert timing channel of the IoT-enabled MTS based on multi-stage verification

C Liang, T Baker, Y Li, R Nawaz… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although the global shipping industry is experiencing a productivity revolution due to the
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …

HiAuth: Hidden authentication for protecting software defined networks

OI Abdullaziz, LC Wang, YJ Chen - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Software defined networking (SDN) enables network function programmability for ease of
configuration and maintenance, and also allows network administrators to change traffic …

Secure data communication using protocol steganography in IPv6

S Bobade, R Goudar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
In secure data communication Network Security is important. Basically in cryptography
Encryption is used for data security. Still attacker can attract towards encrypted data due to …

Network protocol covert channels: Countermeasures techniques

MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …

Network packet payload parity based steganography

OI Abdullaziz, VT Goh, HC Ling… - 2013 IEEE Conference …, 2013 - ieeexplore.ieee.org
Network steganography is an emerging research field, which exploits packet protocol
headers, protocol mechanism, packet payload, etc. to establish secret communication …

An architecture for lifecycle management in very large file systems

A Verma, U Sharma, J Rubas, D Pease… - 22nd IEEE/13th …, 2005 - ieeexplore.ieee.org
We present a policy-based architecture STEPS for lifecycle management (LCM) in a mass
scale distributed file system. The STEPS architecture is designed in the context of IBM's SAN …