메뉴 건너뛰기




Volumn 29, Issue 6, 2010, Pages 686-696

Implementing a passive network covert timing channel

Author keywords

Error correction; Frame synchronization; Network covert channel; Network security; Passive covert timing channel; VOD traffic

Indexed keywords

CHANNEL PARAMETER; COMMUNICATION PERFORMANCE; COVERT TIMING CHANNELS; FRAME DESIGN; FRAME SYNCHRONIZATION; INFORMATION TRANSMISSION; INTERMEDIATE NODE; NETWORK COVERT CHANNEL; THREE CHANNEL; TRANSMISSION INTERVALS;

EID: 77955419362     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.12.010     Document Type: Article
Times cited : (15)

References (32)
  • 12
    • 0036715113 scopus 로고    scopus 로고
    • An information-theoretic and game-theoretic study of timing channels
    • J. Giles, and B. Hajek An information-theoretic and game-theoretic study of timing channels IEEE Transaction on Information Theory 48 9 2002 2455 2477
    • (2002) IEEE Transaction on Information Theory , vol.48 , Issue.9 , pp. 2455-2477
    • Giles, J.1    Hajek, B.2
  • 14
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • Aug. 2001
    • Handley M, Paxson V. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th USENIX security symposium; Aug. 2001.
    • Proceedings of the 10th USENIX Security Symposium
    • Handley, M.1    Paxson, V.2
  • 15
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B.W. Lampson A note on the confinement problem Communications of the ACM 16 10 1973 613 615
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 17
    • 0035481849 scopus 로고    scopus 로고
    • Jitter-based delay-boundary prediction of wide area networks
    • Q. Li, and D.L. Millis Jitter-based delay-boundary prediction of wide area networks IEEE Trans. on Networking 9 5 2001 578 590
    • (2001) IEEE Trans. on Networking , vol.9 , Issue.5 , pp. 578-590
    • Li, Q.1    Millis, D.L.2
  • 19
    • 0036329257 scopus 로고    scopus 로고
    • Steganographic method for secure communications
    • D. Lou, and J. Liu Steganographic method for secure communications Computers and Security 21 5 2002 449 460
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 449-460
    • Lou, D.1    Liu, J.2
  • 24
    • 77955423170 scopus 로고    scopus 로고
    • Eraser: An exploit-specific monitor to prevent malicious communication channel
    • GIT-CERCS-04-28
    • Singh A. Eraser: an exploit-specific monitor to prevent malicious communication channel. Technical report in Georgia Institute of Technology, GIT-CERCS-04-28; 2004.
    • (2004) Technical Report in Georgia Institute of Technology
    • Singh, A.1
  • 27
    • 77955421239 scopus 로고    scopus 로고
    • Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defense Standard, CSC-STD-001-83; 1983
    • Trusted Computer Systems Evaluation Criteria (TCSEC). Department of Defense Standard, CSC-STD-001-83; 1983.
  • 30
    • 71849083789 scopus 로고    scopus 로고
    • A study of on/off timing channel based on packet delay distribution
    • L. Yao, X. Zi, L. Pan, and J. Li A study of on/off timing channel based on packet delay distribution Computers and Security 28 8 2009 785 794
    • (2009) Computers and Security , vol.28 , Issue.8 , pp. 785-794
    • Yao, L.1    Zi, X.2    Pan, L.3    Li, J.4
  • 31
    • 44449087948 scopus 로고    scopus 로고
    • A survey of covert channels and countermeasure in computer network protocols
    • S. Zander, G. Armitage, and P. Branch A survey of covert channels and countermeasure in computer network protocols IEEE Communications Survey and Tutorials 9 3 2007 44 57
    • (2007) IEEE Communications Survey and Tutorials , vol.9 , Issue.3 , pp. 44-57
    • Zander, S.1    Armitage, G.2    Branch, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.