2023
DOI: 10.1109/tdsc.2022.3207573
|View full text |Cite
|
Sign up to set email alerts
|

Generic and Sensitive Anomaly Detection of Network Covert Timing Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 36 publications
0
12
0
Order By: Relevance
“…So far we have shown that ϵ-κlibur can circumvent both, the compressibility score and the ϵ-similarity, and that the enhanced ϵ-similarity method outperforms both classical heuristics. While the main focus of our work was to demonstrate weaknesses and exploitability of these classical heuristics, we additionally evaluate ϵ-κlibur against two recent machine learning-based detection methods: GAS [13] and SnapCatch [14] as introduced in Sect. 3.2.…”
Section: Evaluation Of ϵ-κLibur With Sophisti-cated Detection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…So far we have shown that ϵ-κlibur can circumvent both, the compressibility score and the ϵ-similarity, and that the enhanced ϵ-similarity method outperforms both classical heuristics. While the main focus of our work was to demonstrate weaknesses and exploitability of these classical heuristics, we additionally evaluate ϵ-κlibur against two recent machine learning-based detection methods: GAS [13] and SnapCatch [14] as introduced in Sect. 3.2.…”
Section: Evaluation Of ϵ-κLibur With Sophisti-cated Detection Methodsmentioning
confidence: 99%
“…Li et al proposed another machine learning-based pipeline called Generic and Sensitive (GAS) anomaly detection in [13], which employs a recurrent neural network (RNN), in particular an LSTM. GAS has shown good performance on timing channel detection.…”
Section: Improvements and Derivatives Of The Detection Heuristicsmentioning
confidence: 99%
See 2 more Smart Citations
“…The dataset used is the publicly available dataset provided in Reference 23. This dataset contains two sub‐datasets corresponding to the traffic under LAN and WAN.…”
Section: Viability Analysismentioning
confidence: 99%