2013
DOI: 10.1109/jstsp.2012.2237378
|View full text |Cite
|
Sign up to set email alerts
|

Engineering Statistical Behaviors for Attacking and Defending Covert Channels

Abstract: This paper develops techniques for attacking and defending behavioral anomaly detection methods commonly used in network traffic analysis and covert channels. The main new result is our demonstration of how to use a behavior's or process' -order statistics to build a stochastic process that has the same -order stationary statistics but possesses different, deliberately designed, -order statistics if desired. Such a model realizes a "complexification" of the process or behavior which a defender can use to monit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 37 publications
(50 reference statements)
0
8
0
Order By: Relevance
“…Therefore, covert channels can be detected by studying statistical characteristics of traffic flows. Such methods are described in . We use statistical techniques (multimodality, autocorrelation, and descriptive statistics) as basis to build the input feature vector of our detection scheme (Sections 4 and 5).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, covert channels can be detected by studying statistical characteristics of traffic flows. Such methods are described in . We use statistical techniques (multimodality, autocorrelation, and descriptive statistics) as basis to build the input feature vector of our detection scheme (Sections 4 and 5).…”
Section: Related Workmentioning
confidence: 99%
“…URLs in HTTP are modulated by to construct a distributed covert channel. Similarly, the average size of packets, the ratio of small and large packets, and the change of packet size patterns can act as carriers of the covert information . In these channels, covert information is embedded into behaviors of network users.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, many practical tools are developed by employing covert channel to deliver the privacy information, such as session password, and authority information. Generally, these network covert channels are exploited with a variety of network protocols such as FTP, TCP, IP, and HTTP .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Naik et al [NBSD12] proposed an entropy approach for detecting timing channels. Similarly, Crespi et al [CCG13] studied different statistical anomaly detection methods, commonly used in network traffic analysis, to detect timing covert channels.…”
Section: Overview Of Covert Channel Detectionmentioning
confidence: 99%