2023
DOI: 10.1007/s10586-023-04035-5
|View full text |Cite
|
Sign up to set email alerts
|

A deep learning approach for detecting covert timing channel attacks using sequential data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
1
0
Order By: Relevance
“…In particular, new research in [21] Four deep learning models, including LSTM, 1D-CNN, and hybrid CNN-LSTM models for CTC, was proposed by Al-Eidi et al According to their result findings, the LSTM-CNN detection model achieved a high performance compared to other machine learning and deep learning models. However, successful deployment often necessitates working with large, diverse datasets and utilizing significant computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, new research in [21] Four deep learning models, including LSTM, 1D-CNN, and hybrid CNN-LSTM models for CTC, was proposed by Al-Eidi et al According to their result findings, the LSTM-CNN detection model achieved a high performance compared to other machine learning and deep learning models. However, successful deployment often necessitates working with large, diverse datasets and utilizing significant computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of ML methods for CTC identification rely on statistical features of network traffic, like packets inter-arrival time the entropy [217] this overcomes the creation of effective CTC detectors by the use of deep learning algorithms, particularly LSTM, 1D-CNN, including the LSTM-CNN composite model. The serial data relating to traffic inter-arrival time was used to train the models [218]. By offering one Trusted Execution Environment (TEE) for applications utilizing hardware characteristics like Intel SGX, confidential computing seeks to safeguard the source code as well as data under usage, so ENCIDER uses the SGX computer programming model in analysis and infers probable timing observation points to identify timing along with cache side-channel vulnerability in SGX operations [219].…”
Section: Side Channel Protection Countermeasuresmentioning
confidence: 99%