Covert timing channel detection method based on time interval and payload length analysis

被引:16
|
作者
Han, Jiaxuan [1 ]
Huang, Cheng [1 ]
Shi, Fan [2 ]
Liu, Jiayong [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Peoples R China
[2] Natl Univ Def Technol, Coll Elect Engn, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
Information leakage; Covert channel; Covert timing channel detection; Malicious traffic detection; The knn algorithm; KNN;
D O I
10.1016/j.cose.2020.101952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information leakage is becoming increasingly serious in today' s network environment. Faced with increasingly forceful network defence strategies, attackers are also constantly trying to steal important information from systems. As for security researchers, the most troublesome way of information stealing is the covert channel. Generally, the covert channel is divided into the covert storage channel (CSC) and the covert timing channel (CTC). For the covert storage channel, there are already many effective methods to detect it. However, the detection of the covert timing channel is still in the research stage. The basis for implementing the covert timing channel is to control the sending time of packets, so most researches about the covert timing channel detection are based on the time interval between packets. Based on this idea, we refer to the method adopted in the researches of the malicious traffic detection and propose a covert timing channel detection method based on the k-NearestNeighbor (kNN) algorithm. This method uses a series of statistics related to the time interval and payload length as features to train a machine learning model and using 10-fold cross-validation to improve model performance. The experiment result proves that the model has a great detection effect, the detection accuracy is 0.96, and the Area Under Curve (AUC) value the model is 0.9737. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Detection of Covert Timing Channel Based on Time Series Symbolization
    Wu, Shuhong
    Chen, Yonghong
    Tian, Hui
    Sun, Chonggao
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 2372 - 2382
  • [2] Detection approach for covert channel based on concurrency conflict interval time
    Wang, Yongji
    Wu, Jingzheng
    Ding, Liping
    Zeng, Haitao
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (08): : 1542 - 1553
  • [3] Covert Timing Channel Detection Method Based on Random Forest Algorithm
    Fu, Guangxin
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 165 - 171
  • [4] A network covert timing channel detection method based on threshold secret sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [5] WLAN Covert Timing Channel Detection
    Zhao, Hong
    Chen, Minxiou
    [J]. 2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,
  • [6] A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2380 - 2384
  • [7] Covert Channel Detection: A Survey Based Analysis
    Gober, S. Zerafshan
    Javed, Barkha
    Saqib, Nazar Abbas
    [J]. 2012 9TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (HONET), 2012, : 57 - 64
  • [8] REAL-TIME COVERT TIMING CHANNEL DETECTION IN NETWORKED VIRTUAL ENVIRONMENTS
    Liu, Anyi
    Chen, Jim
    Wechsler, Harry
    [J]. ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 273 - 288
  • [9] Packet Length Covert Channel: A Detection Scheme
    Elsadig, Muawia A.
    Fadlalla, Yahia A.
    [J]. 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [10] Covert channel detection in the ICMP payload using support vector machine
    Sohn, T
    Moon, J
    Lee, S
    Lee, D
    Lim, J
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 828 - 835