2018 1st International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2018
DOI: 10.1109/cais.2018.8442026
|View full text |Cite
|
Sign up to set email alerts
|

Packet Length Covert Channel: A Detection Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…The test results also illustrated that covert channel detection effectiveness increases as applying data labeling. The machine learning‐based detection scheme was presented, and the authors selected frequency‐based features training data, and make a comparison between different machine learning models, getting a relatively competitive accuracy of 98% 48‐49 …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The test results also illustrated that covert channel detection effectiveness increases as applying data labeling. The machine learning‐based detection scheme was presented, and the authors selected frequency‐based features training data, and make a comparison between different machine learning models, getting a relatively competitive accuracy of 98% 48‐49 …”
Section: Related Workmentioning
confidence: 99%
“…The machine learning-based detection scheme was presented, and the authors selected frequency-based features training data, and make a comparison between different machine learning models, getting a relatively competitive accuracy of 98%. [48][49]…”
Section: Related Workmentioning
confidence: 99%
“…These changes cover modifications on the underlay layer, changes inside the virtual networks typically concern to changes of the ip-addresses used. The use of length parameters of the protocols like frame.len and ip.len is useful for the detection of various covert channels like discussed in [34]. So there is no defined list of relevant protocol fields, which should be used for anomaly detection in network forensic investigation.…”
Section: Protocolmentioning
confidence: 99%
“…More advanced and detection-proof techniques are presented in [17,24,28,30]. Additionally, in [15,22] are shown two length-based covert channel detection schemes. Even if the exploited constraints of the Smart Config protocols are already known to the scientific community, the application of a such technique for the configuration of IoT devices is quite new.…”
Section: Related Workmentioning
confidence: 99%