Characterization and Detection of Cross-Router Covert Channels
Tài liệu tham khảo
Amarbayasgalan, 2018, Unsupervised novelty detection using deep autoencoders with density based clustering, Appl. Sci., 8, 1468, 10.3390/app8091468
Breunig, 2000, LOF: identifying density-based local outliers, 93
Brodley, 2006, Network Covert Channels: design, Analysis, Detection, and Elimination, Dissertations & Theses, Purdue University
Cabuk, 2004, IP covert timing channels: design and detection, 178
Davis, 2011, Data preprocessing for anomaly based network intrusion detection: a review, Comput. Secur., 30, 353, 10.1016/j.cose.2011.05.008
El-Atawy, 2017, A novel class of robust covert channels using out-of-order packets, IEEE Trans. Depend. Secur. Comput., 14, 116, 10.1109/TDSC.2015.2443779
Erfani, 2016, High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning, Pattern Recognit., 58, 121, 10.1016/j.patcog.2016.03.028
Goher, 2012, Covert channel detection: A survey based analysis, 057
IEEE 802.11 Working Group, 2016, Ieee standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements - part 11: wireless lan medium access control (mac) and physical layer (phy) specifications, IEEE Std 802.11–2016 (Revision of IEEE Std 802.11–2012), 1
Kurose, 2001
Lampson, 1973, A note on the confinement problem, Commun. ACM, 16, 613, 10.1145/362375.362389
Maurice, 2015, C5: Cross-cores cache covert channel, 46
Maurice, 2017, Hello from the other side: SSH over robust cache covert channels in the cloud
Medical device security 2017. Medical device security, VA enterprise design patterns privacy and security. https://www.oit.va.gov/library/programs/ts/edp/privacy/MedicalDeviceSecurity_V1.pdf.
Microchip Technology Inc.,. Atmega256rfr2 xplained pro evaluation kit. http://www.microchip.com/DevelopmentTools/ProductDetails.aspx?PartNO=atmega256rfr2-xpro.
Miljković, 2010, Review of novelty detection methods, 593
Murillo-Piedrahita, 2015, Flowfence: a denial of service defense system for software defined networking, 1
Ogen, 2018, Sensorless, permissionless information exfiltration with wi-fi micro-jamming
Ovadya, 2019, Cross-router covert channels
Sametinger, 2015, Security challenges for medical devices, Commun. ACM, 58, 74, 10.1145/2667218
Shvartzman, O., Netanel, Y., 2022. Characterization and detection of cross-router covert channels github repository. https://www.github.com/orenshva/Characterization-and-Detection-of-Cross-Router-Covert-Channels.
Stouffer, 2011, Guide to industrial control systems (ics) security, NIST Spec. Publ., 800
Tian, 2020, A survey of key technologies for constructing network covert channel, Secur. Commun. Networks, 2020, 8892896:1
Wustrow, 2014, Tapdance: End-to-middle anticensorship without flow blocking, 159
Yi, 2013, A case for stateful forwarding plane, Comput. Commun., 36, 779, 10.1016/j.comcom.2013.01.005
Zander, 2007, A survey of covert channels and countermeasures in computer network protocols, IEEE Commun. Surv. Tutor., 9, 44, 10.1109/COMST.2007.4317620
Zhang, 2014, Iot security: Ongoing challenges and research opportunities, 230