Covert channel detection: machine learning approaches
MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …
made covert communications easier to construct, faster, undetectable and more secure than …
Towards port-knocking authentication methods for mobile cloud computing
Mobile cloud computing (MCC) is an increasingly popular research topic, partly due to the
widespread adoption of mobile devices and cloud services among individual and …
widespread adoption of mobile devices and cloud services among individual and …
A novel chaos‐based encryption algorithm over TCP data packet for secure communication
In this article, a new algorithm that can encrypt data on TCP data segment by using a novel
chaotic random number generator was developed. First of all, dynamic analyses of the …
chaotic random number generator was developed. First of all, dynamic analyses of the …
Analysis of the adoption of security headers in HTTP
WJ Buchanan, S Helme… - IET Information Security, 2018 - Wiley Online Library
With the increase in the number of threats within web‐based systems, a more integrated
approach is required to ensure the enforcement of security policies from the server to the …
approach is required to ensure the enforcement of security policies from the server to the …
Building covert timing channel of the IoT-enabled MTS based on multi-stage verification
Although the global shipping industry is experiencing a productivity revolution due to the
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …
adoption of IoTs (Internet of Things), the dependence on complex data transmission and …
HiAuth: Hidden authentication for protecting software defined networks
Software defined networking (SDN) enables network function programmability for ease of
configuration and maintenance, and also allows network administrators to change traffic …
configuration and maintenance, and also allows network administrators to change traffic …
Secure data communication using protocol steganography in IPv6
S Bobade, R Goudar - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
In secure data communication Network Security is important. Basically in cryptography
Encryption is used for data security. Still attacker can attract towards encrypted data due to …
Encryption is used for data security. Still attacker can attract towards encrypted data due to …
Network protocol covert channels: Countermeasures techniques
MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …
technology encourage hackers to find new ways to leak confidential information without …
Network packet payload parity based steganography
Network steganography is an emerging research field, which exploits packet protocol
headers, protocol mechanism, packet payload, etc. to establish secret communication …
headers, protocol mechanism, packet payload, etc. to establish secret communication …
An architecture for lifecycle management in very large file systems
We present a policy-based architecture STEPS for lifecycle management (LCM) in a mass
scale distributed file system. The STEPS architecture is designed in the context of IBM's SAN …
scale distributed file system. The STEPS architecture is designed in the context of IBM's SAN …