A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing

Author(s):  
Quan Sun ◽  
Yonghong Chen ◽  
Tian Wang
2020 ◽  
Vol 26 (4) ◽  
pp. 255-266
Author(s):  
Mehrdad Nasseralfoghara ◽  
HamidReza Hamidi

The application nature of HTTP protocol allows the creation of a covert timing channel based on different features of this protocol (or different levels) that has not been addressed in previous research. In this article, the entropy-based detection method was designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyzer’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyzer, we concluded that the analyzer must investigate traffic at all possible levels. We also illustrated that by making noise on a covert channel, its capacity would decrease, but as entropy increases, it would be harder to detect it.


2013 ◽  
Vol 32 (6) ◽  
pp. 1636-1639
Author(s):  
Xing-xing GUAN ◽  
Chang-da WANG ◽  
Zhi-guo LI ◽  
Zhao-jun BO

2010 ◽  
Vol 49 (2) ◽  
pp. 199-205 ◽  
Author(s):  
Guangjie Liu ◽  
Jiangtao Zhai ◽  
Yuewei Dai

Sign in / Sign up

Export Citation Format

Share Document