2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences (ICETAS) 2017
DOI: 10.1109/icetas.2017.8277839
|View full text |Cite
|
Sign up to set email alerts
|

A balanced approach to eliminate packet length-based covert channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…A communication channel used to leak confidential information in a manner that is against security policy of a system is known as a covert channel. It is a highly hazardous, undetectable, persistent, and evolving threat that eludes detection technologies and presents a real challenge [11]. The idea of a covert channel was initially presented by Lampson [12].…”
Section: Type Of Covert Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…A communication channel used to leak confidential information in a manner that is against security policy of a system is known as a covert channel. It is a highly hazardous, undetectable, persistent, and evolving threat that eludes detection technologies and presents a real challenge [11]. The idea of a covert channel was initially presented by Lampson [12].…”
Section: Type Of Covert Channelsmentioning
confidence: 99%
“…Hackers and steganographers have been inspired to create various network covert channel scenarios by the quick evolution of network protocols and methods. This has led to the development of several network-based covert channel approaches [17].…”
Section: Network Covert Channel Classificationmentioning
confidence: 99%
“…Covert channels are mainly divided into two types: storage covert channels (SCC) and timing covert channels (TCT) [15]. In storage channels, storage location is used to hold a covert message [16] such as protocol fields, whereas in timing channels, a covert message is modulated using the timing characteristics of the network traffic. In other words, covert storage channels use an object to send a covert message while covert timing channels use timing aspects to convey covert messages.…”
Section: Covert Channel Typesmentioning
confidence: 99%
“…This motivates us to contribute to this area by presenting our proposed approach which is expected to fully eliminate any potential packet length-based covert channel that is envisioned to leak secret information covertly. This paper is an extended version of our work presented in [7].…”
Section: Introductionmentioning
confidence: 99%