2019 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2019
DOI: 10.1109/hpcs48598.2019.9188115
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Selected Network Covert Channels Using Machine Learning

Abstract: Network covert channels break a computer's security policy to establish a stealthy communication. They are a threat being increasingly used by malicious software. Most previous studies on detecting network covert channels using Machine Learning (ML) were tested with a dataset that was created using one single covert channel tool and also are ineffective at classifying covert channels into patterns. In this paper, selected ML methods are applied to detect popular network covert channels. The capacity of detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…Thus, based on features of anomalous behaviors of packets defined and extracted in Table I, this paper will propose a method to classify these packets. It can be seen that to detect network steganography, previous studies often used algorithms such as SVM [4,15], RF [3]. To improve the efficiency of the network steganography detection method, this paper proposes to use some deep learning algorithms and models.…”
Section: B the Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, based on features of anomalous behaviors of packets defined and extracted in Table I, this paper will propose a method to classify these packets. It can be seen that to detect network steganography, previous studies often used algorithms such as SVM [4,15], RF [3]. To improve the efficiency of the network steganography detection method, this paper proposes to use some deep learning algorithms and models.…”
Section: B the Detection Methodsmentioning
confidence: 99%
“…Most generic methods fall into two subcategories that characterize their approach: statistical or machine learning. The studies [3,4,5,6,7,8] presented several studies and proposals for detecting network steganography based on the abnormal behavior analysis technique and the ruleset database. However, noticed that these approaches have two problems [1,2,9,10,11,12]: using the available dataset and focusing on detecting only one steganography technique.…”
Section: A the Problemmentioning
confidence: 99%
“…Other detection approaches involve deep learning [11], such as Recurrent Neural Networks ( [53] or Reinforcement Learning [54]). [55] puts into evidence that all the above mentioned algorithms were trained and tested on traffic data obtained from just a single covert channel tool. As an advance to this limitation, three ML models (SVM, k-Nearest Neighbors, Deep Neural Networks) on covert traffic generated by nine different tools are discussed to demonstrate that k-NN performed better than the others.…”
Section: Related Workmentioning
confidence: 99%
“…This has motivated the researchers working in the field of networking to apply DL and ML techniques for Network applications like Traffic classification and Prediction. Chourib [16] suggested the use of DL and ML techniques like SVM, DNN, and KNN to identify covert channels in selected header fields of IPv4, ICMP, TCP, UDP, and DNS protocols.…”
Section: Introductionmentioning
confidence: 99%