AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)

被引:0
|
作者
机构
关键词
Covert Traffic; Entropy Approach; Ftp protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An effective way to capturing data from a well-protected network, a covert timing channel manipulates the timing or ordering of network events like packet arrivals for secured information transfer over the Intranet, even without compromising an end-host within the network. On one hand, such information leakage caused by various covert timing channels poses a serious malwares to Internet users. On the other hand, detecting covert timing channels is a well known challenging task in the security community. Generally, the detection of illegal transmission channels uses statistical progress to differentiate covert traffic from legitimate traffic. However, due to the high variation in legitimate network traffic, detection methods based on standard statistical progress are not accurate and to motivate in capturing a covert timing channel. Although there have been recent research efforts on detecting covert timing channels over the Ftp protocol. Some covert channel detection methods are designed to target one specific covert timing channel, and therefore, fail to detect other types of covert timing channels. The other detection methods are broader in detection but are oversensitive to the high variation of network traffic. In short, none of the previous detection methodologies are effective at detecting a variety of covert timing channels Entropy Approach Detect in accurate manner.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Web Covert Timing Channels Detection based on Entropy
    Nasseralfoghara, Mehrdad
    Hamidi, Hamidreza
    2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 12 - 15
  • [2] Evaluating the transmission rate of covert timing channels in a network
    Zi, Xiaochao
    Yao, Lihong
    Jiang, Xinghao
    Pan, Li
    Li, Jianhua
    COMPUTER NETWORKS, 2011, 55 (12) : 2760 - 2771
  • [3] Detecting Covert Timing Channels: An Entropy-Based Approach
    Gianvecchio, Steven
    Wang, Haining
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 307 - 316
  • [4] An Entropy-Based Approach to Detecting Covert Timing Channels
    Gianvecchio, Steven
    Wang, Haining
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 785 - 797
  • [5] Generic and Sensitive Anomaly Detection of Network Covert Timing Channels
    Li, Haozhi
    Song, Tian
    Yang, Yating
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4085 - 4100
  • [6] Detecting Covert Timing Channels Based on Difference Entropy
    Zhang Y.-F.
    Shen Y.
    Yang W.
    Xiao Y.-H.
    Huang L.-S.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2733 - 2759
  • [7] Are Network Covert Timing Channels Statistical Anomalies?
    Iglesias, Felix
    Zseby, Tanja
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [8] SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    Husari, Ghaith
    IEEE ACCESS, 2021, 9 : 177 - 191
  • [9] TCP Covert Timing Channels: Design and Detection
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 420 - 429
  • [10] Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
    Sun, Chonggao
    Chen, Yonghong
    Tian, Hui
    Wu, Shuhong
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 407 - 418