Towards a reliable detection of covert timing channels over real-time network traffic

F Rezaei, M Hempel, H Sharif - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …

Towards a streaming approach to the mitigation of covert timing channels

O Darwish, A Al-Fuqaha, GB Brahim… - … & Mobile Computing …, 2018 - ieeexplore.ieee.org
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …

Перспективные подходы к обнаружению сетевых скрытых каналов

КГ Когос, МА Финошин - Безопасность информационных …, 2021 - bit.mephi.ru
Аннотация Целью данной статьи является анализ существующих методов
обнаружения сетевых скрытых каналов по времени. Для противодействия сетевым …

[图书][B] Exploring the use of hierarchal statistical analysis and deep neural networks to detect and mitigate covert timing channels

O Darwish - 2018 - search.proquest.com
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …

[图书][B] A novel approach towards real-time covert timing channel detection

F Rezaei - 2015 - search.proquest.com
Today's world of data communication and networks has become, and will continue to be, an
inevitable part of people's lives. Communication technologies, network resources, and …