HTTP Cookie Covert Channel Detection Based on Session Flow Interaction Features

被引:0
|
作者
Yuan, Wenxin [1 ]
Chen, Xingshu [1 ]
Zhu, Yi [2 ]
Zeng, Xuemei [2 ]
Yue, Yawei [1 ]
机构
[1] School of Cyber Science and Engineering, Sichuan University, Chengdu,610065, China
[2] Cyber Science Research Institute, Sichuan University, Chengdu,610065, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
10.1155/2023/1348393
中图分类号
学科分类号
摘要
Feature extraction - Learning algorithms
引用
收藏
相关论文
共 50 条
  • [21] Mimic: An active covert channel that evades regularity-based detection
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2013, 57 (03) : 647 - 657
  • [22] covert channel detection based on scale-free networks theory
    Lan, Li
    Xia Linglin
    Wei Wenhong
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 378 - 380
  • [23] Unsupervised detection method of RoQ covert attacks based on multilayer features
    Zhao J.
    Li J.
    Long C.
    Wan W.
    Wei J.
    Chen
    Tongxin Xuebao/Journal on Communications, 2022, 43 (09): : 224 - 239
  • [24] Service detection and analysis of HTTP at port 80 based on flow records
    Ding W.
    Hong Y.
    Xia Z.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 44 (11): : 34 - 38
  • [26] A supplementary method for malicious detection based on Http-Activity similarity features
    Tran, Manh Cong
    Nakamura, Yasuhiro
    Journal of Communications, 2014, 9 (12): : 923 - 929
  • [27] DNS Covert Channel Detection Based on Self-Generated Malicious Traffic
    Diao, Jia-Wen
    Fang, Bin-Xing
    Tian, Zhi-Hong
    Wang, Zhong-Ru
    Song, Shou-You
    Wang, Tian
    Cui, Xiang
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2190 - 2206
  • [28] A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding
    Liu, Jianhua
    Yang, Wei
    Huang, Liusheng
    Chen, Wuji
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 308 - 320
  • [29] Liquid: A detection-resistant covert timing channel based on IPD shaping
    Walls, Robert J.
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2011, 55 (06) : 1217 - 1228
  • [30] A network covert timing channel detection method based on threshold secret sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)