A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Network flow watermarking: A survey
A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …
network administration often takes advantage of TA for purposes such as security, intrusion …
[KIRJA][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …
issues, challenges, trends, and applications. Highlights development trends and potential …
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the develo** third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
[PDF][PDF] Let SDN be your eyes: Secure forensics in data center networks
Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty
is compounded when some machines in the network are compromised, since these …
is compounded when some machines in the network are compromised, since these …
EBSNN: Extended byte segment neural network for network traffic classification
X ** third-party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …
Non-blind watermarking of network flows
Linking network flows is an important problem in intrusion detection as well as anonymity.
Passive traffic analysis can link flows, but requires long periods of observation to reduce …
Passive traffic analysis can link flows, but requires long periods of observation to reduce …
DropWat: An invisible network flow watermark for data exfiltration traceback
A Iacovazzi, S Sarda, D Frassinelli… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network flow watermarking techniques have been proposed during the last ten years as an
approach to trace network flows for intrusion detection purposes. These techniques aim to …
approach to trace network flows for intrusion detection purposes. These techniques aim to …
Robust network covert communications based on TCP and enumerative combinatorics
The problem of communicating covertly over the Internet has recently received considerable
attention from both industry and academic communities. However, the previously proposed …
attention from both industry and academic communities. However, the previously proposed …