Characterization and Detection of Cross-Router Covert Channels

Computers & Security - Tập 127 - Trang 103125 - 2023
Oren Shvartzman1, Adar Ovadya1, Kfir Zvi1, Omer Shwartz1, Rom Ogen1, Yakov Mallah1, Niv Gilboa1, Yossi Oren1
1Ben-Gurion University of the Negev, P.O.B. 653, Beer-Sheva, 8410501, Israel

Tài liệu tham khảo

Amarbayasgalan, 2018, Unsupervised novelty detection using deep autoencoders with density based clustering, Appl. Sci., 8, 1468, 10.3390/app8091468 Breunig, 2000, LOF: identifying density-based local outliers, 93 Brodley, 2006, Network Covert Channels: design, Analysis, Detection, and Elimination, Dissertations & Theses, Purdue University Cabuk, 2004, IP covert timing channels: design and detection, 178 Davis, 2011, Data preprocessing for anomaly based network intrusion detection: a review, Comput. Secur., 30, 353, 10.1016/j.cose.2011.05.008 El-Atawy, 2017, A novel class of robust covert channels using out-of-order packets, IEEE Trans. Depend. Secur. Comput., 14, 116, 10.1109/TDSC.2015.2443779 Erfani, 2016, High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning, Pattern Recognit., 58, 121, 10.1016/j.patcog.2016.03.028 Goher, 2012, Covert channel detection: A survey based analysis, 057 IEEE 802.11 Working Group, 2016, Ieee standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements - part 11: wireless lan medium access control (mac) and physical layer (phy) specifications, IEEE Std 802.11–2016 (Revision of IEEE Std 802.11–2012), 1 Kurose, 2001 Lampson, 1973, A note on the confinement problem, Commun. ACM, 16, 613, 10.1145/362375.362389 Maurice, 2015, C5: Cross-cores cache covert channel, 46 Maurice, 2017, Hello from the other side: SSH over robust cache covert channels in the cloud Medical device security 2017. Medical device security, VA enterprise design patterns privacy and security. https://www.oit.va.gov/library/programs/ts/edp/privacy/MedicalDeviceSecurity_V1.pdf. Microchip Technology Inc.,. Atmega256rfr2 xplained pro evaluation kit. http://www.microchip.com/DevelopmentTools/ProductDetails.aspx?PartNO=atmega256rfr2-xpro. Miljković, 2010, Review of novelty detection methods, 593 Murillo-Piedrahita, 2015, Flowfence: a denial of service defense system for software defined networking, 1 Ogen, 2018, Sensorless, permissionless information exfiltration with wi-fi micro-jamming Ovadya, 2019, Cross-router covert channels Sametinger, 2015, Security challenges for medical devices, Commun. ACM, 58, 74, 10.1145/2667218 Shvartzman, O., Netanel, Y., 2022. Characterization and detection of cross-router covert channels github repository. https://www.github.com/orenshva/Characterization-and-Detection-of-Cross-Router-Covert-Channels. Stouffer, 2011, Guide to industrial control systems (ics) security, NIST Spec. Publ., 800 Tian, 2020, A survey of key technologies for constructing network covert channel, Secur. Commun. Networks, 2020, 8892896:1 Wustrow, 2014, Tapdance: End-to-middle anticensorship without flow blocking, 159 Yi, 2013, A case for stateful forwarding plane, Comput. Commun., 36, 779, 10.1016/j.comcom.2013.01.005 Zander, 2007, A survey of covert channels and countermeasures in computer network protocols, IEEE Commun. Surv. Tutor., 9, 44, 10.1109/COMST.2007.4317620 Zhang, 2014, Iot security: Ongoing challenges and research opportunities, 230