التفاصيل البيبلوغرافية
العنوان: |
A network covert timing channel detection method based on threshold secret sharing. |
المؤلفون: |
Xie, Jinpu, Chen, Yonghong, Wang, Linfan, Wang, Zhe |
المصدر: |
Transactions on Emerging Telecommunications Technologies; Feb2020, Vol. 31 Issue 2, p1-15, 15p |
مصطلحات موضوعية: |
INTRUSION detection systems (Computer security), COMPUTER network security, SHARING, SECRECY |
مستخلص: |
Network covert timing channel (NCTC) is a kind of covert channel that acquires strong concealment by modifying the interpacket delays of legitimate network traffic and can evade detection by conventional network security mechanisms such as firewalls. Existing detection schemes are not able to detect multiple types of covert channels. Moreover, the robustness of the detection method is low when the network environment changes. Therefore, detecting NCTC is a challenging task. In this paper, an NCTC detection method based on threshold secret sharing is proposed. The new approach utilizes the principle of threshold secret sharing to tolerate the loss or the destruction of partial subsecrets, improves the robustness of the detection method, and solves the problem that the current detection method cannot resist environment changes. Experimental results show that the proposed scheme in this paper has strong robustness to a changing network environment such as when network jitter, packet loss, and packet injection occur in the network transmission process. The approach can detect varieties of NCTCs with a guaranteed true positive rate and greatly improve the versatility and robustness. [ABSTRACT FROM AUTHOR] |
|
Copyright of Transactions on Emerging Telecommunications Technologies is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
قاعدة البيانات: |
Complementary Index |