Study on detection of covert channel in Flume system

被引:0
|
作者
School of Computer, Wuhan University, Wuhan 430072, China [1 ]
不详 [2 ]
机构
[1] [1,Cao, Hui
[2] Xiong, Shengchao
[3] 1,Zhang, Huanguo
[4] 1,Yan, Fei
来源
Cao, H. (caohui_computer@163.com) | 1600年 / Science Press卷 / 50期
关键词
Directed graphs;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Covert channel detection in the ICMP payload using support vector machine
    Sohn, T
    Moon, J
    Lee, S
    Lee, D
    Lim, J
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 828 - 835
  • [42] Detection approach for covert channel based on concurrency conflict interval time
    Wang, Yongji
    Wu, Jingzheng
    Ding, Liping
    Zeng, Haitao
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (08): : 1542 - 1553
  • [43] Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems
    Cassavia, Nunziato
    Caviglione, Luca
    Guarascio, Massimo
    Liguori, Angelica
    Zuppelli, Marco
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISMIS 2022), 2022, 13515 : 209 - 218
  • [44] Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation
    Wang, Hao
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (04): : 1927 - 1943
  • [45] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [46] Network Storage Covert Channel Detection Based on Data Joint Analysis
    Fu, Guangxin
    Li, Qingbao
    Chen, Zhifeng
    Zeng, Guangyu
    Gu, Juanjuan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 346 - 357
  • [47] Mimic: An active covert channel that evades regularity-based detection
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2013, 57 (03) : 647 - 657
  • [48] A Novel Covert Timing Channel Detection Approach for Online Network Traffic
    Rezaei, Fahimeh
    Hempel, Michael
    Shrestha, Pradhumna Lal
    Rakshit, Sushanta Mohan
    Sharif, Hamid
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 737 - 738
  • [49] covert channel detection based on scale-free networks theory
    Lan, Li
    Xia Linglin
    Wei Wenhong
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 378 - 380
  • [50] A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
    Semal, Benjamin
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    Kalbantner, Jan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 360 - 377