The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l 2005
DOI: 10.1109/lcn.2005.92
|View full text |Cite
|
Sign up to set email alerts
|

Network Based Detection of Passive Covert Channels in TCP/IP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(16 citation statements)
references
References 1 publication
0
16
0
Order By: Relevance
“…Sohn et al demonstrated that simple covert channels encoded in the IP ID or TCP ISN field can be discovered with high accuracy by Support Vector Machines (SVMs) [Sohn et al 2003]. Tumoian et al showed that a neural network can detect Rutkowska's TCP ISN covert channel [Rutkowska 2004] with high accuracy [Tumoian and Anikeev 2005] (both Random Value pattern). Zander et al demonstrated that inter-packet timing channels can be detected by C4.5 decision trees trained on several features [Zander et al 2011] (Inter-arrival Time pattern).…”
Section: Countermeasures For Patternsmentioning
confidence: 99%
“…Sohn et al demonstrated that simple covert channels encoded in the IP ID or TCP ISN field can be discovered with high accuracy by Support Vector Machines (SVMs) [Sohn et al 2003]. Tumoian et al showed that a neural network can detect Rutkowska's TCP ISN covert channel [Rutkowska 2004] with high accuracy [Tumoian and Anikeev 2005] (both Random Value pattern). Zander et al demonstrated that inter-packet timing channels can be detected by C4.5 decision trees trained on several features [Zander et al 2011] (Inter-arrival Time pattern).…”
Section: Countermeasures For Patternsmentioning
confidence: 99%
“…This means that we do not handle cases where, for example, a single key is sent in one data package. In this way, the proposed technique is similar to other techniques which use machine learning techniques, such as those that employ neural networks (e.g., Tumoian and Anikeev 2005) or support vector machines (e.g., Sohn et al 2003), to analyse data streams for anomalies indicating the possible existence of a covert channel. Since machine learning techniques require training data, it is acknowledged in Tumoian and Anikeev (2005) that it is impossible to discover a covert channel using a single data package and that the more packets that are recorded, the more precise the technique will be.…”
Section: Discussionmentioning
confidence: 99%
“…This statistic is then compared with a threshold for traffic classification. In [3], the authors have proposed detecting covert messages in ISN field by using Elman neural network model. They predict the ISN by using all the data received before and calculate the Hamming distance between the predicted ISN and the new ISN.…”
Section: Literature Surveymentioning
confidence: 99%