A Survey of Key Technologies for Constructing Network Covert Channel
暂无分享,去创建一个
Zhen Li | Gang Xiong | Gaopeng Gou | Jing Tian | Zhuguo Li | Jing Tian | G. Xiong | Gaopeng Gou
[1] Xin Liu,et al. Deep Learning for Encrypted Traffic Classification: An Overview , 2018, IEEE Communications Magazine.
[2] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[3] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] R. A. Leibler,et al. On Information and Sufficiency , 1951 .
[5] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[6] Nuno Santos,et al. DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams , 2017, Proc. Priv. Enhancing Technol..
[7] Thomas Ristenpart,et al. Network Traffic Obfuscation and Automated Internet Censorship , 2016, IEEE Security & Privacy.
[8] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[9] Wojciech Mazurczyk,et al. Retransmission steganography and its detection , 2011, Soft Comput..
[10] Yongji Wang,et al. Improving performance of network covert timing channel through Huffman coding , 2012, Math. Comput. Model..
[11] Chunhui Zhao,et al. An Enlarging-the-Capacity Packet Sorting Covert Channel , 2019, IEEE Access.
[12] Giuseppe Baselli,et al. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow , 1998, Biological Cybernetics.
[13] Peter James Vial,et al. High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform , 2020, Cognitive Systems Research.
[14] Yuewei Dai,et al. Network covert timing channel with distribution matching , 2012, Telecommun. Syst..
[15] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[16] Songlin Sun,et al. Research on Covert Communication Security Based on Screen Content Coding , 2020, IEEE Access.
[17] Hamid Sharif,et al. A Support Vector Machine-Based Framework for Detection of Covert Timing Channels , 2016, IEEE Transactions on Dependable and Secure Computing.
[18] Feng Hao,et al. ZombieCoin 2.0: managing next-generation botnets using Bitcoin , 2018, International Journal of Information Security.
[19] Sebastian Zander,et al. Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..
[20] Dipak Ghosal,et al. A comparative analysis of detection metrics for covert timing channels , 2014, Comput. Secur..
[21] Vitaly Shmatikov,et al. CovertCast: Using Live Streaming to Evade Internet Censorship , 2016, Proc. Priv. Enhancing Technol..
[22] Yuanzhang Li,et al. A Covert Channel Over VoLTE via Adjusting Silence Periods , 2018, IEEE Access.
[23] H. Lilliefors. On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .
[24] Srinivas Devadas,et al. Riffle: An Efficient Communication System With Strong Anonymity , 2016, Proc. Priv. Enhancing Technol..
[25] Vijay Varadharajan,et al. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2014, IEEE Trans. Inf. Forensics Secur..
[26] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[27] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[28] Javier López,et al. Covert communications through network configuration messages , 2013, Comput. Secur..