메뉴 건너뛰기




Volumn 28, Issue 8, 2009, Pages 785-794

A study of on/off timing channel based on packet delay distribution

Author keywords

Covert timing channel; Information transmission rate; Network covert channel; On off timing channel; Packet delay distribution

Indexed keywords

COVERT TIMING CHANNELS; INFORMATION LEAKAGE; INFORMATION TRANSMISSION; INTRUSION DETECTION SYSTEMS; NETWORK COVERT CHANNEL; NETWORK FIREWALLS; PACKET DELAY; PACKET DELAY DISTRIBUTION; REAL NETWORKS; TIME CHANNELS; TIMING CHANNELS; TRANSMISSION PROBABILITIES; TRANSMISSION RATES;

EID: 71849083789     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.05.006     Document Type: Article
Times cited : (59)

References (24)
  • 4
    • 14844330726 scopus 로고    scopus 로고
    • IP covert timing channels: Design and detection
    • Cabuk S, Brodley C, Shields C. IP covert timing channels: design and detection. In: Proc. of ACM CCS; 2004. pp. 178-87.
    • (2004) Proc. of ACM CCS , pp. 178-187
    • Cabuk, S.1    Brodley, C.2    Shields, C.3
  • 5
    • 71849090630 scopus 로고    scopus 로고
    • Cabuk S. Network covert channels: design, analysis, detection, and elimination. Thesis for Ph.D degree: Purdue University; 2006.
    • Cabuk S. Network covert channels: design, analysis, detection, and elimination. Thesis for Ph.D degree: Purdue University; 2006.
  • 9
    • 77952331178 scopus 로고    scopus 로고
    • Detecting covert timing channels: An entropy-based approach
    • pp. 
    • Gianvecchio S, Wang H. Detecting covert timing channels: an entropy-based approach. In: Proc. of ACM CCS; 2007. pp. 307-16.
    • (2007) Proc. of ACM CCS , pp. 307-316
    • Gianvecchio, S.1    Wang, H.2
  • 10
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • Giles J., and Hajek B. An information-theoretic and game-theoretic study of timing channels. IEEE Transaction on Information Theory 48 9 (2002) 2455-2477
    • (2002) IEEE Transaction on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 11
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Aug
    • Handley M, Paxson V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proc. of the 10th USENIX security symposium; Aug. 2001.
    • (2001) Proc. of the 10th USENIX security symposium
    • Handley, M.1    Paxson, V.2
  • 12
    • 34249871943 scopus 로고    scopus 로고
    • Dual-wrapped digital watermarking scheme for image copyright protection
    • Hu M., Lou D., and Chang M. Dual-wrapped digital watermarking scheme for image copyright protection. Computers & Security 26 4 (2007) 319-330
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 319-330
    • Hu, M.1    Lou, D.2    Chang, M.3
  • 13
    • 0035481849 scopus 로고    scopus 로고
    • Jitter-based delay-boundary prediction of wide area networks
    • Li Q., and Millis D.L. Jitter-based delay-boundary prediction of wide area networks. IEEE/ACM Transactions on Networking 9 5 (2001) 578-590
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.5 , pp. 578-590
    • Li, Q.1    Millis, D.L.2
  • 14
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • Lou D., and Liu J. Steganographic method for secure communications. Computers & Security 21 5 (2002) 449-460
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 449-460
    • Lou, D.1    Liu, J.2
  • 16
    • 38049094594 scopus 로고    scopus 로고
    • Luo X, Chan EWW, Chang RKC. Cloak: a ten-fold way for reliable covert communications. ESORICS'07; 2007. pp. 283-98.
    • Luo X, Chan EWW, Chang RKC. Cloak: a ten-fold way for reliable covert communications. ESORICS'07; 2007. pp. 283-98.
  • 17
    • 0028758682 scopus 로고
    • On the dynamics and significance of low-frequency components of Internet load
    • Mukherjee A. On the dynamics and significance of low-frequency components of Internet load. Internetworking: Research and Experience 5 4 (1994) 163-205
    • (1994) Internetworking: Research and Experience , vol.5 , Issue.4 , pp. 163-205
    • Mukherjee, A.1
  • 19
  • 20
    • 0142183968 scopus 로고    scopus 로고
    • Covert channel detection in the ICMP payload using support vector machine
    • Sohn T, Moon J, Lee S, Lee DH, Lim J. Covert channel detection in the ICMP payload using support vector machine. In: Proc. of ISCIS; 2003. pp. 828-35.
    • (2003) Proc. of ISCIS , pp. 828-835
    • Sohn, T.1    Moon, J.2    Lee, S.3    Lee, D.H.4    Lim, J.5
  • 22
    • 50049089585 scopus 로고    scopus 로고
    • Detecting IP covert timing channels by correlating packet timing with memory content
    • Stillman R.M. Detecting IP covert timing channels by correlating packet timing with memory content. IEEE Southeastcon (2008) 204-209
    • (2008) IEEE Southeastcon , pp. 204-209
    • Stillman, R.M.1
  • 23
    • 71849102202 scopus 로고    scopus 로고
    • Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defence Standard, CSC-STD-001-83; 1983.
    • Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defence Standard, CSC-STD-001-83; 1983.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.