IEEE SoutheastCon 2008 2008
DOI: 10.1109/secon.2008.4494286
|View full text |Cite
|
Sign up to set email alerts
|

Detecting IP covert timing channels by correlating packet timing with memory content

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Particularly it should be possible by regulating between parcel delays. We give careful consideration to identify secret channels identified with TCP ISN and IP ID fields [9]. At the SVM preparing time they gathered normal TCP/IP parcels utilizing a tcp dump instrument and abnormal TCP/IP packets(including incognito fields) produced from clandestine tcp and after that tried it for IP Identification field of IP header and grouping number field of TCP header [3].…”
Section: Ip Covert Timing Channelmentioning
confidence: 99%
“…Particularly it should be possible by regulating between parcel delays. We give careful consideration to identify secret channels identified with TCP ISN and IP ID fields [9]. At the SVM preparing time they gathered normal TCP/IP parcels utilizing a tcp dump instrument and abnormal TCP/IP packets(including incognito fields) produced from clandestine tcp and after that tried it for IP Identification field of IP header and grouping number field of TCP header [3].…”
Section: Ip Covert Timing Channelmentioning
confidence: 99%
“…Though experimental results of non-detectability, and capacity are given, non-disclosure and robustness are not considered in their work. Stillman et al have proposed to use a concatenated code (convolutional outer code over an inner copy code) for a CTCC implementation through Mix-firewalls [Stillman 2008]. They have not considered any requirement of an effective CTCC.…”
Section: Covert Timing Channel Communicationmentioning
confidence: 99%
“…Stillman [18] suggested finding correlations between the IPDs of a network stream and the memory content on a compromised machine in order to detect CTCs. The proposed method creates a histogram of the IPDs, that is then used to estimate the values used to encode each symbol in a binary scheme.…”
Section: Defense Against Covert Channelsmentioning
confidence: 99%