A sequential distinguisher for covert channel identification

被引:0
|
作者
Subbalakshmi, K.P. [1 ]
Chandramouli, Rajarathnam [1 ]
Ranganathan, Nagarajan [1 ]
机构
[1] Department of Electrical and Computer Engineering, Institute of Technology, B 315, Hoboken, NJ 07030, United States
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Covert channels are of two types: (a) timing channel and (b) storage channel. Most previous works have studied these channels from the encoder's perspective, namely, information theoretic capacity, algorithms and protocols for hiding information etc. This paper investigates the covert channel problem from an passive adversary's perspective. A sequential distinguisher for storage channel identification by an adversary is proposed and its properties are derived analytically. The impact of correlation in the observations received by the adversary is studied analytically as well as numerically.
引用
收藏
页码:274 / 282
相关论文
共 50 条
  • [1] Optimization of covert channel identification
    Shen, Jianjun
    Qing, Sihan
    Shen, Qingni
    Li, Liping
    THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2006, : 95 - +
  • [2] Transform Sequential Data to Image for Detecting Covert Timing Channel
    Huang, Xuwen
    Chen, Yonghong
    Zhuang, Xiaolong
    Lin, Yuwei
    International Journal of Network Security, 2024, 26 (02) : 224 - 234
  • [3] POSTER: Covert Channel Based on the Sequential Analysis in Android Systems
    Ho, Jun-Won
    Won, KyungRok
    Kim, Jee Sun
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2499 - 2501
  • [4] Covert channel identification founded on information flow analysis
    Shen, JJ
    Qing, SH
    Shen, QN
    Li, LP
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 381 - 387
  • [5] Effect of Entropy Reshaping of the IP Identification Covert Channel on Detection
    Shehab, Manal
    Korany, Noha
    Sadek, Nayera
    Abouelseoud, Yasmine
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 221 - 231
  • [6] A deep learning approach for detecting covert timing channel attacks using sequential data
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    Maabreh, Majdi
    Tashtoush, Yahya
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1655 - 1665
  • [7] Identification of DNS covert channel based on improved convolutional neural network
    Zhang M.
    Sun H.
    Yang P.
    Yang, Peng (yp@cert.org.cn), 1600, Editorial Board of Journal on Communications (41): : 169 - 179
  • [8] A deep learning approach for detecting covert timing channel attacks using sequential data
    Shorouq Al-Eidi
    Omar Darwish
    Yuanzhu Chen
    Majdi Maabreh
    Yahya Tashtoush
    Cluster Computing, 2024, 27 : 1655 - 1665
  • [9] Covert attention enhances letter identification without affecting channel tuning
    Talgar, CP
    Pelli, DG
    Carrasco, M
    JOURNAL OF VISION, 2004, 4 (01): : 22 - 31
  • [10] Covert Sequential Hypothesis Testing
    Chang, Meng-Che
    Bloch, Matthieu R.
    2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,