Detection of Covert Timing Channels with Machine Learning Methods Using Different Window Sizes

被引:0
|
作者
Karadogan, Ismail [1 ]
Karci, Ali [2 ]
机构
[1] Kahramanmaras Istiklal Univ, Bilgisayar Teknolojileri Bolumu, Kahramanmaras, Turkey
[2] Inonu Univ, Bilgisayar Muhendisligi Bolumu, Malatya, Turkey
关键词
Covert channels; network steganography; information security; machine learning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, delays between data packets were read by using different window sizes to detect data transmitted from covert timing channel in computer networks, and feature vectors were extracted from them and detection of hidden data by some classification algorithms was achieved with high performance rate.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
    Sun, Chonggao
    Chen, Yonghong
    Tian, Hui
    Wu, Shuhong
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 407 - 418
  • [22] AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [23] Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
    Bieniasz, Jedrzej
    Stepkowska, Monika
    Janicki, Artur
    Szczypiorski, Krzysztof
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (09) : 1109 - 1130
  • [24] A Statistical Study of Covert Timing Channels Using Network Packet Frequency
    Chen, Fangyue
    Wang, Yunke
    Song, Heng
    Li, Xiangyang
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 166 - 168
  • [25] Cloud-Based Machine Learning Models as Covert Communication Channels
    Krauss, Torsten
    Stang, Jasper
    Dmitrienko, Alexandra
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 141 - 157
  • [26] Detection of child depression using machine learning methods
    Haque, Umme Marzia
    Kabir, Enamul
    Khanam, Rasheda
    PLOS ONE, 2021, 16 (12):
  • [27] Phishing URL detection using machine learning methods
    Ahammad, S. K. Hasane
    Kale, Sunil D.
    Upadhye, Gopal D.
    Pande, Sandeep Dwarkanath
    Babu, E. Venkatesh
    Dhumane, Amol, V
    Bahadur, Dilip Kumar Jang
    ADVANCES IN ENGINEERING SOFTWARE, 2022, 173
  • [28] Medicare Fraud Detection using Machine Learning Methods
    Bauder, Richard A.
    Khoshgoftaar, Taghi M.
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2017, : 858 - 865
  • [29] Detection DDOS Attacks Using Machine Learning Methods
    Aytac, Tugba
    Aydin, Muhammed Ali
    Zaim, Abdul Halim
    ELECTRICA, 2020, 20 (02): : 159 - 167
  • [30] Detection of the irrotational boundary using machine learning methods
    Tao, Shancong
    Xie, Yuanliang
    Shi, Xiaotian
    Zhou, Yi
    PHYSICS OF FLUIDS, 2024, 36 (07)