Academic Journal

A network covert timing channel detection method based on threshold secret sharing.

التفاصيل البيبلوغرافية
العنوان: A network covert timing channel detection method based on threshold secret sharing.
المؤلفون: Xie, Jinpu, Chen, Yonghong, Wang, Linfan, Wang, Zhe
المصدر: Transactions on Emerging Telecommunications Technologies; Feb2020, Vol. 31 Issue 2, p1-15, 15p
مصطلحات موضوعية: INTRUSION detection systems (Computer security), COMPUTER network security, SHARING, SECRECY
مستخلص: Network covert timing channel (NCTC) is a kind of covert channel that acquires strong concealment by modifying the interpacket delays of legitimate network traffic and can evade detection by conventional network security mechanisms such as firewalls. Existing detection schemes are not able to detect multiple types of covert channels. Moreover, the robustness of the detection method is low when the network environment changes. Therefore, detecting NCTC is a challenging task. In this paper, an NCTC detection method based on threshold secret sharing is proposed. The new approach utilizes the principle of threshold secret sharing to tolerate the loss or the destruction of partial subsecrets, improves the robustness of the detection method, and solves the problem that the current detection method cannot resist environment changes. Experimental results show that the proposed scheme in this paper has strong robustness to a changing network environment such as when network jitter, packet loss, and packet injection occur in the network transmission process. The approach can detect varieties of NCTCs with a guaranteed true positive rate and greatly improve the versatility and robustness. [ABSTRACT FROM AUTHOR]
Copyright of Transactions on Emerging Telecommunications Technologies is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:21613915
DOI:10.1002/ett.3781