Towards a reliable detection of covert timing channels over real-time network traffic
Inter-packet delays (IPD) of legitimate network traffic can be exploited for information hiding
purposes and distribution of secret and sensitive data. This process is known as Covert …
purposes and distribution of secret and sensitive data. This process is known as Covert …
Towards a streaming approach to the mitigation of covert timing channels
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …
communication. These type of channels use the time between inter-arrival packets to pass …
Перспективные подходы к обнаружению сетевых скрытых каналов
КГ Когос, МА Финошин - Безопасность информационных …, 2021 - bit.mephi.ru
Аннотация Целью данной статьи является анализ существующих методов
обнаружения сетевых скрытых каналов по времени. Для противодействия сетевым …
обнаружения сетевых скрытых каналов по времени. Для противодействия сетевым …
[图书][B] Exploring the use of hierarchal statistical analysis and deep neural networks to detect and mitigate covert timing channels
O Darwish - 2018 - search.proquest.com
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …
different processes. It utilizes the inter-arrival times between the transmitted packets to hide …
[图书][B] A novel approach towards real-time covert timing channel detection
F Rezaei - 2015 - search.proquest.com
Today's world of data communication and networks has become, and will continue to be, an
inevitable part of people's lives. Communication technologies, network resources, and …
inevitable part of people's lives. Communication technologies, network resources, and …