Covert timing channel detection method based on time interval and payload length analysis

被引:16
|
作者
Han, Jiaxuan [1 ]
Huang, Cheng [1 ]
Shi, Fan [2 ]
Liu, Jiayong [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Peoples R China
[2] Natl Univ Def Technol, Coll Elect Engn, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
Information leakage; Covert channel; Covert timing channel detection; Malicious traffic detection; The knn algorithm; KNN;
D O I
10.1016/j.cose.2020.101952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information leakage is becoming increasingly serious in today' s network environment. Faced with increasingly forceful network defence strategies, attackers are also constantly trying to steal important information from systems. As for security researchers, the most troublesome way of information stealing is the covert channel. Generally, the covert channel is divided into the covert storage channel (CSC) and the covert timing channel (CTC). For the covert storage channel, there are already many effective methods to detect it. However, the detection of the covert timing channel is still in the research stage. The basis for implementing the covert timing channel is to control the sending time of packets, so most researches about the covert timing channel detection are based on the time interval between packets. Based on this idea, we refer to the method adopted in the researches of the malicious traffic detection and propose a covert timing channel detection method based on the k-NearestNeighbor (kNN) algorithm. This method uses a series of statistics related to the time interval and payload length as features to train a machine learning model and using 10-fold cross-validation to improve model performance. The experiment result proves that the model has a great detection effect, the detection accuracy is 0.96, and the Area Under Curve (AUC) value the model is 0.9737. (c) 2020 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页数:7
相关论文
共 50 条
  • [41] Detection of TCP covert channel based on Markov model
    Zhai, Jiangtao
    Liu, Guangjie
    Dai, Yuewei
    TELECOMMUNICATION SYSTEMS, 2013, 54 (03) : 333 - 343
  • [42] DNS covert channel detection method using the LSTM model
    Chen, Shaojie
    Lang, Bo
    Liu, Hongyu
    Li, Duokun
    Gao, Chuan
    COMPUTERS & SECURITY, 2021, 104
  • [43] Covert Channel Capacity Analysis Based on Entropy
    Chen, Li
    Ju, Shiguang
    Zhou, Conghua
    Zhang, Yi
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 363 - 367
  • [44] Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
    Wang, Chong
    Chen, Rong-Liang
    Gu, Liang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 38 (04) : 793 - 806
  • [45] Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
    Chong Wang
    Rong-Liang Chen
    Liang Gu
    Journal of Computer Science and Technology, 2023, 38 : 793 - 806
  • [46] A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
    Wang, Lina
    Liu, Weijie
    Kumar, Neeraj
    He, Debiao
    Tan, Cheng
    Gao, Debin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3543 - 3557
  • [47] A generalized detection framework for covert timing channels based on perceptual hashing
    Zhuang, Xiaolong
    Chen, Yonghong
    Tian, Hui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (05)
  • [48] Network Covert Channel Detection with Cluster based on Hierarchy and Density
    Qian Yuwen
    Song Huaju
    Song Chao
    Wang Xi
    Leng Linjie
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 4175 - 4180
  • [49] Detection of Jitterbug Covert Channel Based on Partial Entropy Test
    Wang, Hao
    Liu, Guangjie
    Liu, Weiwei
    Zhai, Jiangtao
    Dai, Yuewei
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 357 - 368
  • [50] IP traceback solutions based on time to live covert channel
    Jones, E
    Le Moigne, O
    Robert, JM
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 451 - 457