A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Network flow watermarking: A survey

A Iacovazzi, Y Elovici - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Traffic analysis (TA) is a useful tool aimed at understanding network traffic behavior. Basic
network administration often takes advantage of TA for purposes such as security, intrusion …

[KIRJA][B] Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures

W Mazurczyk, S Wendzel, S Zander, A Houmansadr… - 2016 - books.google.com
Describes Information Hiding in communication networks, and highlights their important
issues, challenges, trends, and applications. Highlights development trends and potential …

Detecting co-residency with active traffic analysis techniques

A Bates, B Mood, J Pletcher, H Pruse… - Proceedings of the …, 2012 - dl.acm.org
Virtualization is the cornerstone of the develo** third party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …

[PDF][PDF] Let SDN be your eyes: Secure forensics in data center networks

A Bates, K Butler, A Haeberlen, M Sherr… - Proceedings of the NDSS …, 2014 - cise.ufl.edu
Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty
is compounded when some machines in the network are compromised, since these …

EBSNN: Extended byte segment neural network for network traffic classification

X ** third-party compute industry, allowing
cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical …

Non-blind watermarking of network flows

A Houmansadr, N Kiyavash… - IEEE/ACM Transactions …, 2013 - ieeexplore.ieee.org
Linking network flows is an important problem in intrusion detection as well as anonymity.
Passive traffic analysis can link flows, but requires long periods of observation to reduce …

DropWat: An invisible network flow watermark for data exfiltration traceback

A Iacovazzi, S Sarda, D Frassinelli… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Network flow watermarking techniques have been proposed during the last ten years as an
approach to trace network flows for intrusion detection purposes. These techniques aim to …

Robust network covert communications based on TCP and enumerative combinatorics

X Luo, EWW Chan, P Zhou… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The problem of communicating covertly over the Internet has recently received considerable
attention from both industry and academic communities. However, the previously proposed …