The Evolution of Bio Crypt Keys: From Concept to Implementation

[{“box”:0,”content”:”[if 992 equals=”Open Access”]n

n

n

n

Open Access

nn

n

n[/if 992]n

n

Year : August 8, 2024 at 12:18 pm | [if 1553 equals=””] Volume :15 [else] Volume :15[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 02 | Page : 38-45

n

n

n

n

n

n

By

n

[foreach 286]n

vector

n

n

Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali,

n

    n t

  • n

n

n[/foreach]

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Professor,, Student,, Student,, Student,, Student, P A College of Engineering,, P A College of Engineering,, P A College of Engineering,, P A College of Engineering,, P A College of Engineering, Mangalore,, Mangalore,, Mangalore,, Mangalore,, Maharashtra, India, India, India, India, India
  2. n[/if 1175][/foreach]

n[/if 2099][if 2099 equals=”Yes”][/if 2099]n

n

Abstract

nWith the rapid increase in data exfiltration due to cyber-attacks, Covert Timing Channels (CTCs) have emerged as a significant and sophisticated network security threat. These channels exploit inter-arrival times of data packets to exfiltrate sensitive information from targeted networks. Detecting CTCs increasingly relies on machine learning techniques, which use statistical metrics to differentiate between malicious (covert) and legitimate (overt) traffic flows. However, as cyber-attacks become more adept at evading detection and the prevalence of CTCs grows, there is a critical need to enhance both the performance and precision of detection methods. This is essential to effectively identify and prevent CTCs while mitigating the reduction in quality of service that can result from the detection process. In this paper, we introduce an innovative image-based solution for fully automated detection and localization of CTCs. Our approach leverages the insight that covert channels generate traffic patterns that can be visualized as colored images. Using this concept, our solution is designed to automatically detect and pinpoint the malicious segments (i.e., specific packets) within a traffic flow. By isolating the covert portions of traffic, our method minimizes the negative impact on the quality of service that would occur if entire traffic flows were blocked due to detected covert channels.

n

n

n

Keywords: Covert Timing Channels, Elliptic Curve Cryptography (ECC), Reserved Sockets

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Control & Instrumentation(joci)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Control & Instrumentation(joci)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali. The Evolution of Bio Crypt Keys: From Concept to Implementation. Journal of Control & Instrumentation. August 8, 2024; 15(02):38-45.

n

How to cite this URL: Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali. The Evolution of Bio Crypt Keys: From Concept to Implementation. Journal of Control & Instrumentation. August 8, 2024; 15(02):38-45. Available from: https://journals.stmjournals.com/joci/article=August 8, 2024/view=0

nn[if 992 equals=”Open Access”] Full Text PDF Download[/if 992] n

n[if 992 not_equal=’Open Access’] [/if 992]nn

n

nn[if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

n

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

  1. Frolova, K. Kogos, and A. Epishkina, ‘‘Traffic normalization for covert channel protecting,’’ in Proc. IEEE Conf. Russian Young Researchers Electr. Electron. Eng. (ElConRus), pp. 2330–2333.
  2. Wendzel, W. Mazurczyk, and S. Zander, ‘Unified description for network information hiding methods,’ J. Universal Comput. Sci., vol. 22, no. 11, pp. 1456–1486.
  3. Singh H, Sharma RK, Singh VP. Online handwriting recognition systems for Indic and non-Indic scripts: a review. Artificial Intelligence Review. 2021 Feb;54(2):1525-79.
  4. Liang K, Chen J, He T, Wang W, Singh AK, Rawat DB, Song H, Lyu Z. Review of the Open Datasets for Contactless Sensing. IEEE Internet of Things Journal. 2024 Jan 9.
  5. Caviglione, ‘‘Trends and challenges in network covert channels countermeasures,’ Appl. Sci., vol. 11, no. 4, p. 1641.
  6. Han, C. Huang, F. Shi, and J. Liu, ‘‘Covert timing channel detection method based on timeinterval and payload length analysis,’’ Comput. Secur., vol. 97, Art. no. 101952.
  7. Zhang, T. Huang, W. Rasheed, X. Hu and C. Zhao, “An Enlarging-the-Capacity Packet Sorting Covert Channel,” in IEEE Access, vol. 7, pp. 145634-145640, 2019, doi: 10.1109/ACCESS.2019.2945320.
  8. Tian, G. Xiong, Z. Li, and G. Gou, ‘‘A survey of key technologies for constructing networkcovert channel,’ Secur. Commun. Netw., vol. 2020, pp. 1–20.
  9. Vanderhallen, J. Van Bulck, F. Piessens, and J. T. Mühlberg, ‘Robust authentication for automotive control networks through covert channels,’ Comput. Netw., vol. 193, Art. no. 108079.
  10. Wu, J. Guo, C. Zhang, and C. Li, ‘‘Steganography and steganalysis in voice over IP: A review,’ Sensors, vol. 21, no. 4, p. 1032.
  11. Mileva, A. Velinov, L. Hartmann, S. Wendzel, and W. Mazurczyk, ‘‘Comprehensive analysis of MQTT 5.0 susceptibility tonetwork covert channels,’ Comput. Secur., vol.104, Art. no. 102207.
  12. McLoone, J.V. McCanny: System-on-Chip Architectures and Implementations for Private-Key Data Encryption

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Original Research

n

n

n

n

n

Journal of Control & Instrumentation

n

[if 344 not_equal=””]ISSN: 2229-6972[/if 344]

n

n

n

n

n

[if 2146 equals=”Yes”][/if 2146][if 2146 not_equal=”Yes”][/if 2146]n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 1748 not_equal=””]

[else]

[/if 1748]n

n

n

Volume 15
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 02
Received June 18, 2024
Accepted July 6, 2024
Published August 8, 2024

n

n

n

n

n

n nfunction myFunction2() {nvar x = document.getElementById(“browsefigure”);nif (x.style.display === “block”) {nx.style.display = “none”;n}nelse { x.style.display = “Block”; }n}ndocument.querySelector(“.prevBtn”).addEventListener(“click”, () => {nchangeSlides(-1);n});ndocument.querySelector(“.nextBtn”).addEventListener(“click”, () => {nchangeSlides(1);n});nvar slideIndex = 1;nshowSlides(slideIndex);nfunction changeSlides(n) {nshowSlides((slideIndex += n));n}nfunction currentSlide(n) {nshowSlides((slideIndex = n));n}nfunction showSlides(n) {nvar i;nvar slides = document.getElementsByClassName(“Slide”);nvar dots = document.getElementsByClassName(“Navdot”);nif (n > slides.length) { slideIndex = 1; }nif (n (item.style.display = “none”));nArray.from(dots).forEach(nitem => (item.className = item.className.replace(” selected”, “”))n);nslides[slideIndex – 1].style.display = “block”;ndots[slideIndex – 1].className += ” selected”;n}n”}]