2020
DOI: 10.3390/s20082417
|View full text |Cite
|
Sign up to set email alerts
|

Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications

Abstract: Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Te second type of method extracts behavior statistical features by aggregating network fows and portrays covert behavior at the network fow level. Some works [14][15][16] mainly extracted the time information of the network fow as the feature to detect covert timing channels that use the time to encode information. Such methods obviously cannot detect HTTP cookie covert channels which do not use the time to encode information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Te second type of method extracts behavior statistical features by aggregating network fows and portrays covert behavior at the network fow level. Some works [14][15][16] mainly extracted the time information of the network fow as the feature to detect covert timing channels that use the time to encode information. Such methods obviously cannot detect HTTP cookie covert channels which do not use the time to encode information.…”
Section: Related Workmentioning
confidence: 99%
“…Te frst type of method classifes covert channels by setting thresholds for a small number of features. Relevant works [11,12,15] achieved the detection of covert channels by setting a threshold for a single complex feature. Such methods have good detection efects for specifc types of data but are relatively prone to low robustness of the detection model due to the low dimension of the extracted features.…”
Section: Covert Channel Classifcationmentioning
confidence: 99%
“…A covert channel is a communication channel used to transmit information by exploiting system resources that are not designed to convey data [23]. Commonly, there are two types of covert channels: timing and storage.…”
Section: Covert Channel Typesmentioning
confidence: 99%
“…Also, if the malicious agent greedy sends large covert massages, it will be easier to detect than agents that use smaller covert messages (e.g., 8 bits). We build on the work of Al-Eidi et al [1], which studied the effect of time-delays of covert traffic on the detection process. Their analysis discovered that using packet delays similar to the delays of overt traffic was a good strategy to evade detection.…”
Section: A Raw Data Generationmentioning
confidence: 99%