Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach

MA Elsadig - IEEE Access, 2023 - ieeexplore.ieee.org
The characteristics and performance of wireless sensor networks (WSNs) are the main
reasons for their rapid expansion in various fields. However, these networks are extremely …

[PDF][PDF] Security issues and challenges on wireless sensor networks

MA Elsadig, A Altigani, MAA Baraka - Int. J. Adv. Trends Comput …, 2019 - researchgate.net
ABSTRACT Wireless Sensor Networks (WSNs) are emerging as a rich field of active
research that is involved different aspects. Nowadays, sensors are used in many domains as …

[HTML][HTML] Unsupervised packet-based anomaly detection in virtual networks

D Spiekermann, J Keller - Computer Networks, 2021 - Elsevier
The enormous number of network packets transferred in modern networks together with the
high speed of transmissions hamper the implementation of successful IT security …

[HTML][HTML] Network Covert Channels

M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …

Towards robust and stealthy communication for wireless intelligent terminals

C Liang, K Qiu, Z Zhang, J Yang, Y Li… - International Journal of …, 2022 - Wiley Online Library
Abstract Fifth‐generation (5G) wireless systems provide an opportunity for improving the
existing Voice over Internet Protocol communication service's user experience. To mitigate …

[PDF][PDF] An ensemble model to detect packet length covert channels.

MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …

Covert channel detection and generation techniques: A survey

NA AL-Khulaidi, AT Zahary… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The use of covert communications has become more widespread recently as a solution to
the information security issue. Information security can be partially solved by the discovery …

A (in) secure-by-design IoT protocol: the esp touch protocol and a case study analysis from the real market

G Salzillo, M Rak - Proceedings of the 2020 joint workshop on CPS&IoT …, 2020 - dl.acm.org
The number of IoT devices designed and marketed in these last years is continuously
growing. These smart things are more often managed through the cloud, therefore more and …

New High Secure Network Steganography Method Based on Packet Length.

V Sabeti, M Shoaei - ISeCure, 2020 - search.ebscohost.com
In the network steganography methods based on packet length, the length of the packets is
used as a carrier for exchanging secret messages. Existing methods in this area are …