covert timing channel
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 10)

H-INDEX

8
(FIVE YEARS 1)

Author(s):  
Jiamin Zheng ◽  
Shupan Li ◽  
Shengang Hao ◽  
Yuanzhang Li ◽  
Yu Zhang

2021 ◽  
pp. 81-88
Author(s):  
Zhibin Zhang ◽  
Xiaosong Zhang ◽  
Yuan Xue ◽  
Yuanzhang Li

2020 ◽  
Vol 26 (4) ◽  
pp. 255-266
Author(s):  
Mehrdad Nasseralfoghara ◽  
HamidReza Hamidi

The application nature of HTTP protocol allows the creation of a covert timing channel based on different features of this protocol (or different levels) that has not been addressed in previous research. In this article, the entropy-based detection method was designed and implemented. The attacker can adjust the amount of channel entropy by controlling measures such as changing the channel’s level or creating noise on the channel to protect from the analyzer’s detection. As a result, the entropy threshold is not always constant for detection. By comparing the entropy from different levels of the channel and the analyzer, we concluded that the analyzer must investigate traffic at all possible levels. We also illustrated that by making noise on a covert channel, its capacity would decrease, but as entropy increases, it would be harder to detect it.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Qinbao Xu ◽  
Li Liu ◽  
Rizwan Akhtar ◽  
Muhammad Asif Zahoor Raja ◽  
Changda Wang

Provenances, which record the history of data acquisition and transmission, are hard to be transmitted in resource-tightened wireless sensor networks (WSNs) due to their drastic size expansion with the increase in packet transmission hops. To ease the burden caused by the provenance transmission, we first designed a two-dimensional covert timing channel (2dCTC) and then applied it to provenances transmission in WSNs. Based on Cantor Expansion, 2dCTC uses pseudo packet IDs permutation and packet sizes variation together to form a two-dimensional communication medium. Both theoretical analysis and experimental results show that 2dCTC not only has a much higher channel capacity than those of most of the known CTCs, but also conserves more energy for provenance transmission in WSNs. Furthermore, 2dCTC provides a new way to increase CTCs channel capacity and stealthiness through multi-dimensional approaches.


Sign in / Sign up

Export Citation Format

Share Document