Using MapReduce and Hierarchical Entropy Analysis to Speed-Up the Detection of Covert Timing Channels

被引:0
作者
Darwish, Omar [1 ]
Al-Fuqaha, Ala [1 ]
Ben Brahim, Ghassen [2 ]
Javed, Muhamad Awais [3 ]
机构
[1] Western Michigan Univ, Comp Sci Dept, Kalamazoo, MI 49008 USA
[2] Prince Mohammad Univ, Comp Sci Dept, Al Khobar 31952, Saudi Arabia
[3] COMSATS, Comp Sci Dept, Islamabad 45550, Pakistan
来源
2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2017年
关键词
Big data; MapReduce; Security; Covert timing channels; Hierarchical entropy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Covert timing channels provide a mechanism to transmit unauthorized information across different processes. Applications that generate large datasets allow this information to be easily hidden within the big data, making it difficult to detect. In this paper, we introduce the application of big data analysis techniques, specifically MapReduce, in the process of speeding up the performance of covert time channels detection. The hierarchal entropy algorithm (HEA) is utilized to reveal a "needle" of covert timing channels from a huge "haystack" of inter-arrival times. A real indexed inter-arrival dataset of approximately 1.4 gigabyte is generated between two different machines and injected by 615 bytes of covert timing message. The HEA with MapReduce was able to uncover around 7*10(-6) of hidden covert message from this huge amount of data in a significantly shorter time as compared to the classical sequential HEA.
引用
收藏
页码:1102 / 1107
页数:6
相关论文
共 15 条
  • [1] [Anonymous], 2014, 11 USENIX S OPERATIN
  • [2] Archibald R, 2015, IEEE CONF COMM NETW, P236, DOI 10.1109/CNS.2015.7346833
  • [3] Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
  • [4] Chen H, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING (GRC), P43, DOI 10.1109/GrC.2013.6740378
  • [5] Darwish O, 2015, INT WIREL COMMUN, P153, DOI 10.1109/IWCMC.2015.7289074
  • [6] Dean J., P 6 S OP SYST DES IM
  • [7] Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud
    Gui, Qiong
    Wang, Xiaoliang
    Liu, Bingwei
    Jin, Zhanpeng
    Chen, Yu
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 541 - 544
  • [8] Towards Model Based Approach to Hadoop Deployment and Configuration
    Huang, Yicheng
    Lan, Xingtu
    Chen, Xing
    Guo, Wenzhong
    [J]. 2015 12TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2015, : 79 - 84
  • [9] Kogos KG, 2017, IEEE NW RUSS YOUNG, P459, DOI 10.1109/EIConRus.2017.7910590
  • [10] Reducing the Search Space for Big Data Mining for Interesting Patterns from Uncertain Data
    Leung, Carson Kai-Sang
    MacKinnon, Richard Kyle
    Jiang, Fan
    [J]. 2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 315 - 322