Detection approach for covert channel based on concurrency conflict interval time

被引:0
|
作者
Wang, Yongji [1 ,2 ]
Wu, Jingzheng [1 ,3 ]
Ding, Liping [1 ]
Zeng, Haitao [4 ]
机构
[1] National Engineering Research Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
[2] State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
[3] Graduate University of Chinese Academy of Sciences, Beijing 100049, China
[4] China Mobile Research Institute, Beijing 100053, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Concurrency control
引用
收藏
页码:1542 / 1553
相关论文
共 50 条
  • [21] Covert Timing Channel Detection Method Based on Random Forest Algorithm
    Fu, Guangxin
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 165 - 171
  • [22] An anomaly detection framework for time series data: An interval-based approach
    Zhou, Yanjun
    Ren, Huorong
    Li, Zhiwu
    Pedrycz, Witold
    KNOWLEDGE-BASED SYSTEMS, 2021, 228
  • [23] Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation
    Wang, Hao
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (04): : 1927 - 1943
  • [24] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [25] DGA and DNS Covert Channel Detection System based on Machine Learning
    Wang, Zhiqiang
    Dong, Hongyu
    Chi, Yaping
    Zhang, Jianyi
    Yang, Tao
    Liu, Qixu
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [26] Network Storage Covert Channel Detection Based on Data Joint Analysis
    Fu, Guangxin
    Li, Qingbao
    Chen, Zhifeng
    Zeng, Guangyu
    Gu, Juanjuan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 346 - 357
  • [27] Mimic: An active covert channel that evades regularity-based detection
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2013, 57 (03) : 647 - 657
  • [28] covert channel detection based on scale-free networks theory
    Lan, Li
    Xia Linglin
    Wei Wenhong
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 378 - 380
  • [29] A Probability-Model-Based Approach to Detect Covert Timing Channel
    Yang, Peng
    Zhao, Hui
    Bao, Zhonggui
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 1043 - 1047
  • [30] Packet Length Covert Channel: A Detection Scheme
    Elsadig, Muawia A.
    Fadlalla, Yahia A.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,