Covert channel detection: machine learning approaches
MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …
made covert communications easier to construct, faster, undetectable and more secure than …
A Review on Network Covert Channel Construction and Attack Detection
MA Khadse, DM Dakhane - Concurrency and Computation …, 2024 - Wiley Online Library
ABSTRACT A covert network channel is a communication channel in which the message is
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
[HTML][HTML] Network Covert Channels
M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …
channels are now more secure, quicker to set up, harder to detect, and easier to design than …
Weaknesses of popular and recent covert channel detection methods and a remedy
Network covert channels are applied for the secret exfiltration of confidential data, the
stealthy operation of malware, and legitimate purposes, such as censorship circumvention …
stealthy operation of malware, and legitimate purposes, such as censorship circumvention …
A deep learning approach for detecting covert timing channel attacks using sequential data
The advanced development of communication technologies has made covert
communications quite challenging to be recognized. By altering an entity's timing behavior …
communications quite challenging to be recognized. By altering an entity's timing behavior …
Deep learning-based detection methods for covert communications in E-health transmissions
F Massimi, F Benedetto - 2022 45th International Conference …, 2022 - ieeexplore.ieee.org
Despite the numerous advantages offered by e-health applications, healthcare data of
patients are at huge risk, being targeted by several different types of digital menaces and …
patients are at huge risk, being targeted by several different types of digital menaces and …
HTTP cookie covert channel detection based on session flow interaction features
W Yuan, X Chen, Y Zhu, X Zeng… - Security and …, 2023 - Wiley Online Library
HTTP cookie covert channel is a covert communication method that encodes malicious
information in cookie fields to escape regulatory audits. It is difficult to detect this kind of …
information in cookie fields to escape regulatory audits. It is difficult to detect this kind of …
[PDF][PDF] An ensemble model to detect packet length covert channels.
MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …
attacks. They exploit ways that are not intended to convey information; therefore, traditional …
Covert channel detection and generation techniques: A survey
NA AL-Khulaidi, AT Zahary… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The use of covert communications has become more widespread recently as a solution to
the information security issue. Information security can be partially solved by the discovery …
the information security issue. Information security can be partially solved by the discovery …
Convolutional neural network structure to detect and localize ctc using image processing
Many cybersecurity attacks utilize Covert Timing Channels as a method to secretly transmit
(steal) sensitive information from target networks such as untrusted Internet of Things (IoT) …
(steal) sensitive information from target networks such as untrusted Internet of Things (IoT) …