The Evolution of Bio Crypt Keys: From Concept to Implementation

Year : 2024 | Volume :15 | Issue : 02 | Page : 38-45
By

Sayed Abdulhayan,

Mohammed Nazeem,

Mohammed Rakheeb Chowdary,

Mohammed Rashid,

Mukthar Ahmed Ali,

  1. Professor, P A College of Engineering, Mangalore, India
  2. Student, P A College of Engineering, Mangalore, India
  3. Student, P A College of Engineering, Mangalore, India
  4. Student, P A College of Engineering, Mangalore, India
  5. Student, P A College of Engineering, Maharashtra, India

Abstract

With the rapid increase in data exfiltration due to cyber-attacks, Covert Timing Channels (CTCs) have emerged as a significant and sophisticated network security threat. These channels exploit inter-arrival times of data packets to exfiltrate sensitive information from targeted networks. Detecting CTCs increasingly relies on machine learning techniques, which use statistical metrics to differentiate between malicious (covert) and legitimate (overt) traffic flows. However, as cyber-attacks become more adept at evading detection and the prevalence of CTCs grows, there is a critical need to enhance both the performance and precision of detection methods. This is essential to effectively identify and prevent CTCs while mitigating the reduction in quality of service that can result from the detection process. In this paper, we introduce an innovative image-based solution for fully automated detection and localization of CTCs. Our approach leverages the insight that covert channels generate traffic patterns that can be visualized as colored images. Using this concept, our solution is designed to automatically detect and pinpoint the malicious segments (i.e., specific packets) within a traffic flow. By isolating the covert portions of traffic, our method minimizes the negative impact on the quality of service that would occur if entire traffic flows were blocked due to detected covert channels.

Keywords: Covert Timing Channels, Elliptic Curve Cryptography (ECC), Reserved Sockets

[This article belongs to Journal of Control & Instrumentation(joci)]

How to cite this article: Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali. The Evolution of Bio Crypt Keys: From Concept to Implementation. Journal of Control & Instrumentation. 2024; 15(02):38-45.
How to cite this URL: Sayed Abdulhayan, Mohammed Nazeem, Mohammed Rakheeb Chowdary, Mohammed Rashid, Mukthar Ahmed Ali. The Evolution of Bio Crypt Keys: From Concept to Implementation. Journal of Control & Instrumentation. 2024; 15(02):38-45. Available from: https://journals.stmjournals.com/joci/article=2024/view=161789



References

  1. Frolova, K. Kogos, and A. Epishkina, ‘‘Traffic normalization for covert channel protecting,’’ in Proc. IEEE Conf. Russian Young Researchers Electr. Electron. Eng. (ElConRus), pp. 2330–2333.
  2. Wendzel, W. Mazurczyk, and S. Zander, ‘Unified description for network information hiding methods,’ J. Universal Comput. Sci., vol. 22, no. 11, pp. 1456–1486.
  3. Singh H, Sharma RK, Singh VP. Online handwriting recognition systems for Indic and non-Indic scripts: a review. Artificial Intelligence Review. 2021 Feb;54(2):1525-79.
  4. Liang K, Chen J, He T, Wang W, Singh AK, Rawat DB, Song H, Lyu Z. Review of the Open Datasets for Contactless Sensing. IEEE Internet of Things Journal. 2024 Jan 9.
  5. Caviglione, ‘‘Trends and challenges in network covert channels countermeasures,’ Appl. Sci., vol. 11, no. 4, p. 1641.
  6. Han, C. Huang, F. Shi, and J. Liu, ‘‘Covert timing channel detection method based on timeinterval and payload length analysis,’’ Comput. Secur., vol. 97, Art. no. 101952.
  7. Zhang, T. Huang, W. Rasheed, X. Hu and C. Zhao, “An Enlarging-the-Capacity Packet Sorting Covert Channel,” in IEEE Access, vol. 7, pp. 145634-145640, 2019, doi: 10.1109/ACCESS.2019.2945320.
  8. Tian, G. Xiong, Z. Li, and G. Gou, ‘‘A survey of key technologies for constructing networkcovert channel,’ Secur. Commun. Netw., vol. 2020, pp. 1–20.
  9. Vanderhallen, J. Van Bulck, F. Piessens, and J. T. Mühlberg, ‘Robust authentication for automotive control networks through covert channels,’ Comput. Netw., vol. 193, Art. no. 108079.
  10. Wu, J. Guo, C. Zhang, and C. Li, ‘‘Steganography and steganalysis in voice over IP: A review,’ Sensors, vol. 21, no. 4, p. 1032.
  11. Mileva, A. Velinov, L. Hartmann, S. Wendzel, and W. Mazurczyk, ‘‘Comprehensive analysis of MQTT 5.0 susceptibility tonetwork covert channels,’ Comput. Secur., vol.104, Art. no. 102207.
  12. McLoone, J.V. McCanny: System-on-Chip Architectures and Implementations for Private-Key Data Encryption

Regular Issue Subscription Original Research
Volume 15
Issue 02
Received June 18, 2024
Accepted July 6, 2024
Published August 8, 2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.