Analysis and detection of covert information transfers in MLS network

被引:0
|
作者
Cai, Zhi-Yong [1 ]
Zhang, Xing [2 ]
Shen, Chang-Xiang [2 ]
机构
[1] College of Computer Science, Zhejiang University, Hangzhou 310027, China
[2] College of Computer Science, Beijing University of Technology, Beijing 100124, China
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Network security
引用
收藏
页码:1226 / 1230
相关论文
共 50 条
  • [1] Network Storage Covert Channel Detection Based on Data Joint Analysis
    Fu, Guangxin
    Li, Qingbao
    Chen, Zhifeng
    Zeng, Guangyu
    Gu, Juanjuan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 346 - 357
  • [2] Covert respiration measures for the detection of concealed information
    Elaad, Eitan
    Ben-Shakhar, Gershon
    BIOLOGICAL PSYCHOLOGY, 2008, 77 (03) : 284 - 291
  • [3] Covert channel detection using Information Theory
    Helouet, Loic
    Roumy, Aline
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (51): : 34 - 51
  • [4] Enumerative covert channel audit model in MLS networks
    Cai Zhiyong
    Qu Youli
    Li Fei
    Shen Changxiang
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2961 - +
  • [5] Analysis of Reversible Network Covert Channels
    Szary, Przemyslaw
    Mazurczyk, Wojciech
    Wendzel, Steffen
    Caviglione, Luca
    IEEE ACCESS, 2022, 10 : 41226 - 41238
  • [6] Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
    Butt, Wasi Haider
    Akram, M. Usman
    Khan, Shoab A.
    Javed, Muhammad Younus
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] A Protocol Independent Approach in Network Covert Channel Detection
    Ayub, Md. Ahsan
    Smith, Steven
    Siraj, Ambareen
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 171 - 176
  • [8] A Review on Network Covert Channel Construction and Attack Detection
    Khadse, Mrinal Ashish
    Dakhane, Dhananjay Manohar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (01):
  • [9] A Covert Network Attack Detection Method Based on LSTM
    Nie, Junke
    Ma, Peng
    Wang, B. O.
    Su, Yang
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1690 - 1693
  • [10] VoIP network covert channels to enhance privacy and information sharing
    Saenger, Jens
    Mazurczyk, Wojciech
    Keller, Joerg
    Caviglione, Luca
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 96 - 106