[{“box”:0,”content”:”[if 992 equals=”Open Access”]n
n
Open Access
nn
n
n[/if 992]n
n
n
n
n

n
Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali,
n
- n t
n
n
n[/foreach]
n
n[if 2099 not_equal=”Yes”]n
- [foreach 286] [if 1175 not_equal=””]n t
- Professor,, Student,, Student,, Student,, Student, P A College of Engineering,, P A College of Engineering,, P A College of Engineering,, P A College of Engineering,, P A College of Engineering, Mangalore,, Mangalore,, Mangalore,, Mangalore,, Maharashtra, India, India, India, India, India
n[/if 1175][/foreach]
n[/if 2099][if 2099 equals=”Yes”][/if 2099]n
Abstract
nWith the rapid increase in data exfiltration due to cyber-attacks, Covert Timing Channels (CTCs) have emerged as a significant and sophisticated network security threat. These channels exploit inter-arrival times of data packets to exfiltrate sensitive information from targeted networks. Detecting CTCs increasingly relies on machine learning techniques, which use statistical metrics to differentiate between malicious (covert) and legitimate (overt) traffic flows. However, as cyber-attacks become more adept at evading detection and the prevalence of CTCs grows, there is a critical need to enhance both the performance and precision of detection methods. This is essential to effectively identify and prevent CTCs while mitigating the reduction in quality of service that can result from the detection process. In this paper, we introduce an innovative image-based solution for fully automated detection and localization of CTCs. Our approach leverages the insight that covert channels generate traffic patterns that can be visualized as colored images. Using this concept, our solution is designed to automatically detect and pinpoint the malicious segments (i.e., specific packets) within a traffic flow. By isolating the covert portions of traffic, our method minimizes the negative impact on the quality of service that would occur if entire traffic flows were blocked due to detected covert channels.
n
Keywords: Covert Timing Channels, Elliptic Curve Cryptography (ECC), Reserved Sockets
n[if 424 equals=”Regular Issue”][This article belongs to Journal of Control & Instrumentation(joci)]
n
n
n
n
n
nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n
nn[if 379 not_equal=””]n
Browse Figures
n
n
n[/if 379]n
References
n[if 1104 equals=””]n
- Frolova, K. Kogos, and A. Epishkina, ‘‘Traffic normalization for covert channel protecting,’’ in Proc. IEEE Conf. Russian Young Researchers Electr. Electron. Eng. (ElConRus), pp. 2330–2333.
- Wendzel, W. Mazurczyk, and S. Zander, ‘Unified description for network information hiding methods,’ J. Universal Comput. Sci., vol. 22, no. 11, pp. 1456–1486.
- Singh H, Sharma RK, Singh VP. Online handwriting recognition systems for Indic and non-Indic scripts: a review. Artificial Intelligence Review. 2021 Feb;54(2):1525-79.
- Liang K, Chen J, He T, Wang W, Singh AK, Rawat DB, Song H, Lyu Z. Review of the Open Datasets for Contactless Sensing. IEEE Internet of Things Journal. 2024 Jan 9.
- Caviglione, ‘‘Trends and challenges in network covert channels countermeasures,’ Appl. Sci., vol. 11, no. 4, p. 1641.
- Han, C. Huang, F. Shi, and J. Liu, ‘‘Covert timing channel detection method based on timeinterval and payload length analysis,’’ Comput. Secur., vol. 97, Art. no. 101952.
- Zhang, T. Huang, W. Rasheed, X. Hu and C. Zhao, “An Enlarging-the-Capacity Packet Sorting Covert Channel,” in IEEE Access, vol. 7, pp. 145634-145640, 2019, doi: 10.1109/ACCESS.2019.2945320.
- Tian, G. Xiong, Z. Li, and G. Gou, ‘‘A survey of key technologies for constructing networkcovert channel,’ Secur. Commun. Netw., vol. 2020, pp. 1–20.
- Vanderhallen, J. Van Bulck, F. Piessens, and J. T. Mühlberg, ‘Robust authentication for automotive control networks through covert channels,’ Comput. Netw., vol. 193, Art. no. 108079.
- Wu, J. Guo, C. Zhang, and C. Li, ‘‘Steganography and steganalysis in voice over IP: A review,’ Sensors, vol. 21, no. 4, p. 1032.
- Mileva, A. Velinov, L. Hartmann, S. Wendzel, and W. Mazurczyk, ‘‘Comprehensive analysis of MQTT 5.0 susceptibility tonetwork covert channels,’ Comput. Secur., vol.104, Art. no. 102207.
- McLoone, J.V. McCanny: System-on-Chip Architectures and Implementations for Private-Key Data Encryption
nn[/if 1104][if 1104 not_equal=””]n
- [foreach 1102]n t
- [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
n[/foreach]
n[/if 1104]
nn
nn[if 1114 equals=”Yes”]n
n[/if 1114]
n
n
n
n
n
| Volume | 15 | |
| [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] | 02 | |
| Received | June 18, 2024 | |
| Accepted | July 6, 2024 | |
| Published | August 8, 2024 |
n
n
n
n
n
n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]

