Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network

被引:1
作者
Sun, Chonggao [1 ]
Chen, Yonghong [1 ]
Tian, Hui [1 ]
Wu, Shuhong [1 ]
机构
[1] Huaqiao Univ, Xiamen Key Lab Data Secur & Blockchain Technol, Xiamen 361021, Fujian, Peoples R China
来源
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY | 2021年 / 2卷
基金
中国国家自然科学基金;
关键词
Timing; Generative adversarial networks; Feature extraction; Robustness; Real-time systems; Deep learning; Entropy; Covert timing channel; deep learning; Gramian angular fields; generative adversarial network;
D O I
10.1109/OJCS.2021.3131598
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Covert timing channels (CTCs) are defined as a mechanism that embeds covert information into network traffic. In a manner, information leakage caused by CTCs brings serious threat to network security. In recent years, detection of CTCs is a focus and a challenging task in the field of covert channel research. However, existing detection schemes based on statistical methods have poor performance in detecting multiple CTCs, and require so many inter-arrival times of packets that these schemes cannot detect CTCs in real time. In this paper, we propose a novel deep learning approach for CTCs detection, namely, covert timing channels detection based on auxiliary classifier generative adversarial network (CD-ACGAN). The network structure and loss function of CD-ACGAN are designed to be suitable for CTCs detection task. We first encode traffic flows into single-channel Gramian Angular Field (GAF) images. Then we use CD-ACGAN to learn features from GAF images and predict the classes of CTCs. Our experimental results show that our approach has high accuracy and strong robustness in detecting various CTCs.
引用
收藏
页码:407 / 418
页数:12
相关论文
共 35 条
[1]   SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning [J].
Al-Eidi, Shorouq ;
Darwish, Omar ;
Chen, Yuanzhu ;
Husari, Ghaith .
IEEE ACCESS, 2021, 9 :177-191
[2]  
[Anonymous], 2004, P ACM C COMP COMM SE, DOI DOI 10.1145/1030083.1030108
[3]  
[Anonymous], 2006, Network covert channels: Design, analysis, detection, and elimination
[4]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[5]   IP Covert Channel Detection [J].
Cabuk, Serdar ;
Brodley, Carla E. ;
Shields, Clay .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
[6]   Using hierarchical statistical analysis and deep neural networks to detect covert timing channels [J].
Darwish, Omar ;
Al-Fuqaha, Ala ;
Ben Brahim, Ghassen ;
Jenhani, Ilyes ;
Vasilakos, Athanasios .
APPLIED SOFT COMPUTING, 2019, 82
[7]  
Evans L. C., 1997, Current developments in mathematics, V1997, P65, DOI DOI 10.4310/CDM.1997.V1997.N1.A2
[8]  
Fu GX, 2017, 2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), P165, DOI 10.1109/ICCT.2017.8359624
[9]  
Fuglede B, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, P31
[10]   An Entropy-Based Approach to Detecting Covert Timing Channels [J].
Gianvecchio, Steven ;
Wang, Haining .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) :785-797