2003
DOI: 10.1007/978-3-540-45215-7_46
|View full text |Cite
|
Sign up to set email alerts
|

Support Vector Machine Based ICMP Covert Channel Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…For some complex storage channels, such as ISN-based or ICMP-based ones (Sohn et al, 2003a;Tumoian and Anikeev, 2005a), it is difficult to detect them only via examining single packets. Thus, some artificial intelligence techniques, including support vector machine, neural network, etc., are utilized to find the abnormality of header fields and detect these channels (Sohn et al, 2003a,b;Tumoian and Anikeev, 2005a).…”
Section: Channel Detection and Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…For some complex storage channels, such as ISN-based or ICMP-based ones (Sohn et al, 2003a;Tumoian and Anikeev, 2005a), it is difficult to detect them only via examining single packets. Thus, some artificial intelligence techniques, including support vector machine, neural network, etc., are utilized to find the abnormality of header fields and detect these channels (Sohn et al, 2003a,b;Tumoian and Anikeev, 2005a).…”
Section: Channel Detection and Countermeasuresmentioning
confidence: 99%
“…Till now, many fields in the TCP/IP suite of protocols have been revealed to hide information, including IP checksum, IP TTL, TCP initial sequence number, IP timestamp, etc. Accordingly, a series of encoding schemes are introduced to hide the information into these fields, and kinds of covert storage channels (Zander et al, 2007b;Abad, 2001;Giffin et al, 2002;Sohn et al, 2003a) have been introduced. In network covert timing channels, the transmission time of the media packets is used to carry information.…”
Section: Introductionmentioning
confidence: 99%
“…In , the authors investigate the possibility of information hiding within the protocol headers of Long Term Evolution (LTE) Advanced. Although the CSC methods offer promising capacity for embedding hidden information, these algorithms are not reliable enough and can be detected by relatively simple techniques .…”
Section: Literature Reviewmentioning
confidence: 99%
“…Covert channels are the principle enablers in a distributed denial of service (DDoS) attack that causes a denial of service to legitimate machines. 39 A DDoS attacker covertly distributes (portions of) his attack tools over many machines spread across the Internet, and later triggers these intermediary machines into beginning the attack and remotely coordinates the attack.…”
Section: Covert Channelsmentioning
confidence: 99%