2017
DOI: 10.13052/jcsm2245-1439.632
|View full text |Cite
|
Sign up to set email alerts
|

Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic

Abstract: Covert timing channels are security threats that have concerned the expert community from the beginnings of secure computer networks. In this paper we explore the nature of covert timing channels by studying the behavior of a selection of features used for their detection. Insights are obtained from experimental studies based on ten covert timing channels techniques published in the literature, which include popular and novel approaches. The study digs into the shapes of flows containing covert timing channels… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
(40 reference statements)
0
3
0
Order By: Relevance
“…Note that most techniques manipulate Inter Departure Times (IDTs) in origin, which transform into IATs in destination (in short, IAT � IDT + transmission_delays). An analytic study of the characteristics of different covert timing channel techniques is discussed in [35]. By default, CCgen comes with three timing techniques.…”
Section: Covert Timing Channelsmentioning
confidence: 99%
“…Note that most techniques manipulate Inter Departure Times (IDTs) in origin, which transform into IATs in destination (in short, IAT � IDT + transmission_delays). An analytic study of the characteristics of different covert timing channel techniques is discussed in [35]. By default, CCgen comes with three timing techniques.…”
Section: Covert Timing Channelsmentioning
confidence: 99%
“…The inter-arrival times of legitimate traffic only depend on the current network environment. But the inter-arrival times mainly depend on the covert information to be transmitted in CTCs [27]. Therefore, many popular methods distinguish between CTCs and legitimate traffic by some statistical characteristics of inter-arrival times flow.…”
Section: B Popular Ctcs Detection Approachesmentioning
confidence: 99%
“…Decision Tree classifier also used in [30] for identifying and detecting covert timing channels. Moreover, in order to improve the accuracy of covert channel detection, the authors in [31,32], used unsupervised machine learning methods to classify and detect covert timing channels based on the statistical properties of network traffic. Recently, in [33], a new covert timing channel detection method proposed based on using deep neural networks and a set of statistical features extracted from the flow of inter-arrival times using the hierarchical statistical-based method.…”
Section: Covert Timing Channels Detection Approachesmentioning
confidence: 99%