AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)

被引:0
|
作者
机构
关键词
Covert Traffic; Entropy Approach; Ftp protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An effective way to capturing data from a well-protected network, a covert timing channel manipulates the timing or ordering of network events like packet arrivals for secured information transfer over the Intranet, even without compromising an end-host within the network. On one hand, such information leakage caused by various covert timing channels poses a serious malwares to Internet users. On the other hand, detecting covert timing channels is a well known challenging task in the security community. Generally, the detection of illegal transmission channels uses statistical progress to differentiate covert traffic from legitimate traffic. However, due to the high variation in legitimate network traffic, detection methods based on standard statistical progress are not accurate and to motivate in capturing a covert timing channel. Although there have been recent research efforts on detecting covert timing channels over the Ftp protocol. Some covert channel detection methods are designed to target one specific covert timing channel, and therefore, fail to detect other types of covert timing channels. The other detection methods are broader in detection but are oversensitive to the high variation of network traffic. In short, none of the previous detection methodologies are effective at detecting a variety of covert timing channels Entropy Approach Detect in accurate manner.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
    Gorantla, Siva K.
    Kadloor, Sachin
    Kiyavash, Negar
    Coleman, Todd P.
    Moskowitz, Ira S.
    Kang, Myong H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 64 - 75
  • [22] Leveraging Statistical Feature Points for Generalized Detection of Covert Timing Channels
    Shrestha, Pradhumna Lal
    Hempel, Michael
    Rezaei, Fahimeh
    Sharif, Hamid
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 7 - 11
  • [23] A generalized detection framework for covert timing channels based on perceptual hashing
    Zhuang, Xiaolong
    Chen, Yonghong
    Tian, Hui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (05)
  • [24] A perceptual hash-based approach to detect covert timing channels
    Wang, Linfan
    Chen, Yonghong
    Chen, Yonghong (iamcyh@hqu.edu.cn), 1600, Femto Technique Co., Ltd. (22): : 686 - 697
  • [25] An Entropy-based Method for Detection of Covert Channels over LTE
    Wang, Zukui
    Huang, Liusheng
    Yang, Wei
    He, Zhiqiang
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 872 - 877
  • [26] Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach
    Cabaj, Krzysztof
    Mazurczyk, Wojciech
    Nowakowski, Piotr
    Zorawski, Piotr
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [27] A sensitive network jitter measurement for covert timing channels over interactive traffic
    Zhang, Quanxin
    Gong, Hanxiao
    Zhang, Xiaosong
    Liang, Chen
    Tan, Yu-an
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) : 3493 - 3509
  • [28] A sensitive network jitter measurement for covert timing channels over interactive traffic
    Quanxin Zhang
    Hanxiao Gong
    Xiaosong Zhang
    Chen Liang
    Yu-an Tan
    Multimedia Tools and Applications, 2019, 78 : 3493 - 3509
  • [29] A model for evaluating the robustness of network covert channels based on entropy TOPSIS method
    Zhang, Jiajing
    Xu, Bangquan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 55 - 60
  • [30] Code Layering for the Detection of Network Covert Channels in Agentless Systems
    Zuppelli, Marco
    Repetto, Matteo
    Schaffhauser, Andreas
    Mazurczyk, Wojciech
    Caviglione, Luca
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2282 - 2294