SnapCatch: automatic detection of covert timing channels using image processing and machine learning

S Al-Eidi, O Darwish, Y Chen, G Husari - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …

Generic and sensitive anomaly detection of network covert timing channels

H Li, T Song, Y Yang - IEEE Transactions on Dependable and …, 2022 - ieeexplore.ieee.org
Network covert timing channels can be maliciously used to exfiltrate secrets, coordinate
attacks and propagate malwares, posing serious threats to cybersecurity. Current covert …

Weaknesses of popular and recent covert channel detection methods and a remedy

S Zillien, S Wendzel - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
Network covert channels are applied for the secret exfiltration of confidential data, the
stealthy operation of malware, and legitimate purposes, such as censorship circumvention …

A multi-layer steganographic method based on audio time domain segmented and network steganography

P Xue, H Liu, J Hu, R Hu - AIP Conference Proceedings, 2018 - pubs.aip.org
Both audio steganography and network steganography are belong to modern
steganography. Audio steganography has a large capacity. Network steganography is …

A novel topology link-controlling approach for active defense of nodes in networks

J Li, HP Hu, Q Ke, N **ong - Sensors, 2017 - mdpi.com
With the rapid development of virtual machine technology and cloud computing, distributed
denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of …

[PDF][PDF] A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration.

P Xue, JS Hu, H Liu, RG Hu - J. Inf. Hiding Multim. Signal Process., 2017 - bit.kuas.edu.tw
In recent years, network steganography has become a new research direction in the field of
information hiding. In this paper, a new network steganographic method called Transverse …

[PDF][PDF] A New DHT: Network Steganography Based on Distributed Coding.

P Xue, JS Hu, RG Hu, H Liu, Y Gu - J. Inf. Hiding Multim. Signal …, 2018 - bit.kuas.edu.tw
Network steganography is a new branch of information hiding. Compared with digital media
steganography, it has a stronger undetectability and difficult to track. To further enhance the …

Estimation of the costs of information system downtime in organisations: underlying threats, effects and cost factors

Q Li - 2016 - essay.utwente.nl
Information system has been widely applied in companies to support sophisticated activities
and processes so as to enhance efficiency and reduce costs. The availability and reliability …

Factors influencing adoption of medical IoT in US Nursing homes

E Manners - 2020 - search.proquest.com
The rise of the Internet of Things (IoT) gives people the ability to check the status of their
home securities, start their cars, and remotely open and close their garage doors from …

Investigasi log jaringan untuk deteksi serangan Distributed Denial Of Service (DDOS) dengan menggunakan metode general REGRESSION neural network

MH Hafid - 2019 - etheses.uin-malang.ac.id
INDONESIA: Salah satu jenis serangan di dunia maya dengan intensitas yang cukup besar
yaitu serangan Distributed Denial of Service (DDoS). Dibutuhkan sistem deteksi intrusi yang …