A study of on/off timing channel based on packet delay distribution
暂无分享,去创建一个
Jianhua Li | Li Pan | Xiaochao Zi | Lihong Yao | Jianhua Li | Li Pan | Lihong Yao | Xiaochao Zi
[1] Amarnath Mukherjee,et al. On the Dynamics and Significance of Low Frequency Components of Internet Load , 1992 .
[2] Hesham El-Sayed,et al. A novel covert channel based on the IP header record route option , 2007, Int. J. Adv. Media Commun..
[3] Ronald William Smith,et al. Predictable Design of Network-Based Covert Communication Systems , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[4] R.M. Stillman. Detecting IP covert timing channels by correlating packet timing with memory content , 2008, IEEE SoutheastCon 2008.
[5] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[6] Matthias Bauer. New covert channels in HTTP: adding unwitting Web browsers to anonymity sets , 2003, WPES '03.
[7] Xiapu Luo,et al. Cloak: A Ten-Fold Way for Reliable Covert Communications , 2007, ESORICS.
[8] C. Brodley,et al. Network covert channels: design, analysis, detection, and elimination , 2006 .
[9] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[10] Der-Chyuan Lou,et al. Dual-wrapped digital watermarking scheme for image copyright protection , 2007, Comput. Secur..
[11] C. Bovy,et al. Analysis of end-to-end delay measurements in the Internet , 2002 .
[12] Bruce E. Hajek,et al. An information-theoretic and game-theoretic study of timing channels , 2002, IEEE Trans. Inf. Theory.
[13] C. Pandu Rangan,et al. Steganographic Communication in Ordered Channels , 2006, Information Hiding.
[14] Xiapu Luo,et al. TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[15] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[16] David L. Mills,et al. Jitter-based delay-boundary prediction of wide-area networks , 2001, TNET.
[17] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[18] Dong Hoon Lee,et al. Covert Channel Detection in the ICMP Payload Using Support Vector Machine , 2003, ISCIS.
[19] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[20] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[21] Anthony Ephremides,et al. A covert channel in MAC protocols based on splitting algorithms , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[22] Hiroyuki Ohsaki,et al. Modeling end-to-end packet delay dynamics of the internet using system identification , 2001 .