AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)

被引:0
|
作者
机构
关键词
Covert Traffic; Entropy Approach; Ftp protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An effective way to capturing data from a well-protected network, a covert timing channel manipulates the timing or ordering of network events like packet arrivals for secured information transfer over the Intranet, even without compromising an end-host within the network. On one hand, such information leakage caused by various covert timing channels poses a serious malwares to Internet users. On the other hand, detecting covert timing channels is a well known challenging task in the security community. Generally, the detection of illegal transmission channels uses statistical progress to differentiate covert traffic from legitimate traffic. However, due to the high variation in legitimate network traffic, detection methods based on standard statistical progress are not accurate and to motivate in capturing a covert timing channel. Although there have been recent research efforts on detecting covert timing channels over the Ftp protocol. Some covert channel detection methods are designed to target one specific covert timing channel, and therefore, fail to detect other types of covert timing channels. The other detection methods are broader in detection but are oversensitive to the high variation of network traffic. In short, none of the previous detection methodologies are effective at detecting a variety of covert timing channels Entropy Approach Detect in accurate manner.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] Research on the Influence of Network Condition to Network Covert Timing Channels
    Yang, Peng
    Zhao, Hui
    Bao, Zhonggui
    PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 338 - 341
  • [12] The Role of Hierarchical Entropy Analysis in the Detection and Time-Scale Determination of Covert Timing Channels
    Darwish, Omar
    Al-Fuqaha, Ala
    Anan, Muhammad
    Nasser, Nidal
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 153 - 159
  • [13] Using MapReduce and Hierarchical Entropy Analysis to Speed-Up the Detection of Covert Timing Channels
    Darwish, Omar
    Al-Fuqaha, Ala
    Ben Brahim, Ghassen
    Javed, Muhamad Awais
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1102 - 1107
  • [14] A Novel Covert Timing Channel Detection Approach for Online Network Traffic
    Rezaei, Fahimeh
    Hempel, Michael
    Shrestha, Pradhumna Lal
    Rakshit, Sushanta Mohan
    Sharif, Hamid
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 737 - 738
  • [15] Using Covert Timing Channels for Attack Detection in MANETs
    Edwards, Jonathan J.
    Brown, J. David
    Mason, Peter C.
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [16] A comparative analysis of detection metrics for covert timing channels
    Archibald, Rennie
    Ghosar, Dipak
    COMPUTERS & SECURITY, 2014, 45 : 284 - 292
  • [17] Towards a Streaming Approach to the Mitigation of Covert Timing Channels
    Darwish, Omar
    Al-Fuqaha, Ala
    Ben Brahim, Ghassen
    Jenhani, Ilyes
    Anan, Muhammad
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 255 - 260
  • [18] Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic
    Rezaei, Fahimeh
    Hempel, Michael
    Sharif, Hamid
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (03) : 249 - 264
  • [19] Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
    Bieniasz, Jedrzej
    Stepkowska, Monika
    Janicki, Artur
    Szczypiorski, Krzysztof
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (09) : 1109 - 1130
  • [20] A Statistical Study of Covert Timing Channels Using Network Packet Frequency
    Chen, Fangyue
    Wang, Yunke
    Song, Heng
    Li, Xiangyang
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 166 - 168