Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Detection of covert timing channel based on time series symbolization

S Wu, Y Chen, H Tian, C Sun - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
Covert Timing Channels (CTCs) is a technique to leak information. CTCs only modify inter-
arrival time sequence (IATs) between packets, consequently, traditional network security …

Decision tree rule induction for detecting covert timing channels in TCP/IP traffic

F Iglesias, V Bernhardt, R Annessi, T Zseby - … : First IFIP TC 5, WG 8.4, 8.9 …, 2017 - Springer
The detection of covert channels in communication networks is a current security challenge.
By clandestinely transferring information, covert channels are able to circumvent security …

CCgen: injecting covert channels into network traffic

F Iglesias, F Meghdouri, R Annessi… - Security and …, 2022 - Wiley Online Library
Covert channels are methods to convey information clandestinely by exploiting the inherent
capabilities of common communication protocols. They can be used to hide malware …

Are network covert timing channels statistical anomalies?

F Iglesias, T Zseby - Proceedings of the 12th International Conference on …, 2017 - dl.acm.org
Covert channels exploit communication protocols to clandestinely transfer information. They
enable criminals to hide malicious activities and can be used for secret data exfiltration …

Covert timing channel detection based on isolated binary trees

Y Lin, Y Chen, H Tian, X Zhuang - Computers & Security, 2025 - Elsevier
As a communication method for concealing information, the covert network channel is often
exploited for malicious purposes due to its inherently difficult-to-detect nature, posing …

Analytic study of features for the detection of covert timing channels in networktraffic

FI Vázquez, R Annessi, T Zseby - Journal of Cyber …, 2017 - journals.riverpublishers.com
Covert timing channels are security threats that have concerned the expert community from
the beginnings of secure computer networks. In this paper we explore the nature of covert …

[PDF][PDF] Bro covert channel detection (BroCCaDe) framework: scope and background

H Gunadi, S Zander - 2017 - it.murdoch.edu.au
Our goal is to extend Bro with mechanisms to detect covert channels. In this report, we
investigate and compare different ways to extend Bro and propose the design of our Bro …

[引用][C] 网络隐蔽信道关键技术研究综述

李彦峰, 丁丽萍, 吴敬征, 崔强, 刘雪花, 关贝, 王永吉 - 软件学报, 2019