[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

An Entropy-Based Approach to Detecting Covert Timing Channels

Published: 01 November 2011 Publication History

Abstract

The detection of covert timing channels is of increasing interest in light of recent exploits of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting covert timing channels is a challenging task. Existing detection schemes are ineffective at detecting most of the covert timing channels known to the security community. In this paper, we introduce a new entropy-based approach to detecting various covert timing channels. Our new approach is based on the observation that the creation of a covert timing channel has certain effects on the entropy of the original process, and hence, a change in the entropy of a process provides a critical clue for covert timing channel detection. Exploiting this observation, we investigate the use of entropy and conditional entropy in detecting covert timing channels. Our experimental results show that our entropy-based approach is sensitive to the current covert timing channels and is capable of detecting them in an accurate manner.

Cited By

View all
  • (2024)A generalized detection framework for covert timing channels based on perceptual hashingTransactions on Emerging Telecommunications Technologies10.1002/ett.497835:5Online publication date: 9-May-2024
  • (2023)Detection of Network Time Covert Channels Based on Image ProcessingProceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things10.1145/3603781.3603906(701-707)Online publication date: 26-May-2023
  • (2023)ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a NetworkProceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things10.1145/3603781.3603888(614-620)Online publication date: 26-May-2023
  • Show More Cited By
  1. An Entropy-Based Approach to Detecting Covert Timing Channels

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image IEEE Transactions on Dependable and Secure Computing
    IEEE Transactions on Dependable and Secure Computing  Volume 8, Issue 6
    November 2011
    159 pages

    Publisher

    IEEE Computer Society Press

    Washington, DC, United States

    Publication History

    Published: 01 November 2011

    Author Tags

    1. Network security
    2. covert timing channels
    3. entropy-based detection.

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A generalized detection framework for covert timing channels based on perceptual hashingTransactions on Emerging Telecommunications Technologies10.1002/ett.497835:5Online publication date: 9-May-2024
    • (2023)Detection of Network Time Covert Channels Based on Image ProcessingProceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things10.1145/3603781.3603906(701-707)Online publication date: 26-May-2023
    • (2023)ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a NetworkProceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things10.1145/3603781.3603888(614-620)Online publication date: 26-May-2023
    • (2023)On Detecting Route Hijacking Attack in Opportunistic Mobile NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.318602920:3(2516-2532)Online publication date: 1-May-2023
    • (2023)A Novel Covert Timing Channel Based on Bitcoin MessagesIEEE Transactions on Computers10.1109/TC.2023.327509672:10(2913-2924)Online publication date: 15-May-2023
    • (2022)Generic and Sensitive Anomaly Detection of Network Covert Timing ChannelsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320757320:5(4085-4100)Online publication date: 19-Sep-2022
    • (2022)A robust packet‐dropping covert channel for mobile intelligent terminalsInternational Journal of Intelligent Systems10.1002/int.2286837:10(6928-6950)Online publication date: 25-Aug-2022
    • (2021)A Timestamp-Regulating VoLTE Covert Channel against Statistical AnalysisMobile Networks and Applications10.1007/s11036-019-01485-326:4(1493-1502)Online publication date: 1-Aug-2021
    • (2020)A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrentSecurity and Communication Networks10.1155/2020/88483152020Online publication date: 1-Jan-2020
    • (2020)VoNR-IPDSecurity and Communication Networks10.1155/2020/88462302020Online publication date: 1-Jan-2020
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media