Support vector machine based ICMP covert channel attack detection

被引:0
|
作者
Sohn, T [1 ]
Noh, T [1 ]
Moon, J [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul 136701, South Korea
来源
COMPUTER NETWORK SECURITY | 2003年 / 2776卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
TCP/IP protocol basically have much vulnerability in protocol itself. Specially, ICMP is ubiquitous to almost every TCP/IP based network. Thereupon, many networks consider ICMP traffic to be benign and will allow it to be passed through, unmolested. So, attackers can tunnel(covert channel) any information they want through it. To detect an ICMP covert channel, we use SVM which has excellent performance in pattern classification. Our experiments show that the proposed method can detect an ICMP covert channel among normal ICMP traffic using SVM.
引用
收藏
页码:461 / 464
页数:4
相关论文
共 50 条
  • [1] Covert channel detection in the ICMP payload using support vector machine
    Sohn, T
    Moon, J
    Lee, S
    Lee, D
    Lim, J
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 828 - 835
  • [2] A study on the covert channel detection of TCP/IP header using support vector machine
    Sohn, T
    Seo, JT
    Moon, J
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 313 - 324
  • [3] An Improved Side-Channel Attack based on Support Vector Machine
    Zeng, Zhong
    Gu, Dawu
    Liu, Junrong
    Guo, Zheng
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 676 - 680
  • [4] ICMP Covert Channel Resiliency
    Stokes, Kristian
    Yuan, Bo
    Johnson, Daryl
    Lutz, Peter
    TECHNOLOGICAL DEVELOPMENTS IN NETWORKING, EDUCATION AND AUTOMATION, 2010, : 503 - 506
  • [5] A Support Vector Machine-Based Framework for Detection of Covert Timing Channels
    Shrestha, Pradhumna Lal
    Hempel, Michael
    Rezaei, Fahimeh
    Sharif, Hamid
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 274 - 283
  • [6] Cyber Attack Detection System based on Improved Support Vector Machine
    Singh, Shailendra
    Silakari, Sanjay
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 371 - 385
  • [7] Improved Support Vector Machine for Cyber Attack Detection
    Singh, Shailendra
    Agrawal, Sanjay
    Rizvi, Murtaza A.
    Thakur, Ramjeevan Singh
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL I, 2011, : 394 - 399
  • [8] DDoS Attack Detection Method Based on V-Support Vector Machine
    Tang, Xiangyan
    Cao, Rui
    Cheng, Jieren
    Fan, Dong
    Tu, Wenxuan
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 42 - 56
  • [9] Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [10] A Side Channel Attack Detection System Using Processor Core Events and a Support Vector Machine
    Oshana, Rob
    Thornton, Mitchell A.
    Caraman, Mike
    2022 11TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2022, : 176 - 183