AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)

被引:0
|
作者
机构
关键词
Covert Traffic; Entropy Approach; Ftp protocol;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An effective way to capturing data from a well-protected network, a covert timing channel manipulates the timing or ordering of network events like packet arrivals for secured information transfer over the Intranet, even without compromising an end-host within the network. On one hand, such information leakage caused by various covert timing channels poses a serious malwares to Internet users. On the other hand, detecting covert timing channels is a well known challenging task in the security community. Generally, the detection of illegal transmission channels uses statistical progress to differentiate covert traffic from legitimate traffic. However, due to the high variation in legitimate network traffic, detection methods based on standard statistical progress are not accurate and to motivate in capturing a covert timing channel. Although there have been recent research efforts on detecting covert timing channels over the Ftp protocol. Some covert channel detection methods are designed to target one specific covert timing channel, and therefore, fail to detect other types of covert timing channels. The other detection methods are broader in detection but are oversensitive to the high variation of network traffic. In short, none of the previous detection methodologies are effective at detecting a variety of covert timing channels Entropy Approach Detect in accurate manner.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Network based detection of passive covert channels in TCP/IP
    Tumoian, E
    Anikeev, M
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 802 - 807
  • [32] A Support Vector Machine-Based Framework for Detection of Covert Timing Channels
    Shrestha, Pradhumna Lal
    Hempel, Michael
    Rezaei, Fahimeh
    Sharif, Hamid
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 274 - 283
  • [33] Covert Timing Channels Detection Based on Image Processing Using Deep Learning
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    Elkhodr, Mahmoud
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 3, 2022, 451 : 546 - 555
  • [34] Teaching Network Covert Channels using a Hands-on Approach
    Trabelsi, Zouheir
    PROCEEDINGS OF THE 2020 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2020), 2020, : 323 - 328
  • [35] Traffic Controller: A Practical Approach to Block Network Covert Timing Channel
    Wang, Yi
    Chen, Ping
    Ge, Yi
    Mao, Bing
    Xie, Li
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 349 - 354
  • [36] Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices
    Liu, Weiwei
    Liu, Guangjie
    Ji, Xiaopeng
    Zhai, Jiangtao
    Dai, Yuewei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (04): : 1866 - 1883
  • [37] A Novel Analytical Model and its Test Bed Verification for Network Covert Timing Channels
    Shrestha, Pradhumna L.
    Hempel, Michael
    Rezaei, Fahimeh
    Sharif, Hamid
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 227 - 235
  • [38] A Protocol Independent Approach in Network Covert Channel Detection
    Ayub, Md. Ahsan
    Smith, Steven
    Siraj, Ambareen
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 171 - 176
  • [39] Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
    Wendzel, Steffen
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [40] Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels
    Nowakowski, Piotr
    Zorawski, Piotr
    Cabaj, Krzysztof
    Mazurczyk, Wojciech
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,