2003
DOI: 10.1007/978-3-540-39737-3_103
|View full text |Cite
|
Sign up to set email alerts
|

Covert Channel Detection in the ICMP Payload Using Support Vector Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Although the introduction of a micro protocol influences the behavior of a covert communication, it is likely that the detection using known approaches, such as support vector machines , is feasible for SSH, FTP, and additional services.…”
Section: Resultsmentioning
confidence: 99%
“…Although the introduction of a micro protocol influences the behavior of a covert communication, it is likely that the detection using known approaches, such as support vector machines , is feasible for SSH, FTP, and additional services.…”
Section: Resultsmentioning
confidence: 99%
“…Using ICMP protocol as a medium for a covert channel, Sohn, et al [5] proposed a detection method based on Support Vector Machine (SVM) to learn ICMP packets payload characteristics. They used Loki2 to generate abnormal ICMP packets and Tcpdump to capture network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…But this classifier has been tested against only one CTC. In [22,23], the authors have successfully used the SVM classifier techniques for classifying specific CSCs. The authors discuss covert channels that use TCP/IP header fields such as IP Identification and Sequence Number, and ICMP payload traffic and detect them using a SVM based pattern classifier.…”
Section: Literature Surveymentioning
confidence: 99%