Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An ensemble model to detect packet length covert channels

View through CrossRef
<span lang="EN-US">Covert channel techniques have enriched the way to commit dangerous and unwatched attacks. They exploit ways that are not intended to convey information; therefore, traditional security measures cannot detect them. One class of covert channels that difficult to detect, mitigate, or eliminate is packet length covert channels. This class of covert channels takes advantage of packet length variations to convey covert information. Numerous research articles reflect the useful use of machine learning (ML) classification approaches to discover covert channels. Therefore, this study presented an efficient ensemble classification model to detect such types of attacks. The ensemble model consists of five machine learning algorithms representing the base classifiers. The base classifiers include naive Bayes (NB), decision tree (DT), support vector machine (SVM), k-nearest neighbor (KNN), and random forest (RF). Whereas, the logistic regression (LR) classifier was employed to aggregate the outputs of the base classifiers and thus to generate the ensemble classifier output. The results showed a good performance of our proposed ensemble classifier. It beats all single classification algorithms, with a 99.3% accuracy rate and negligible classification errors.</span>
Title: An ensemble model to detect packet length covert channels
Description:
<span lang="EN-US">Covert channel techniques have enriched the way to commit dangerous and unwatched attacks.
They exploit ways that are not intended to convey information; therefore, traditional security measures cannot detect them.
One class of covert channels that difficult to detect, mitigate, or eliminate is packet length covert channels.
This class of covert channels takes advantage of packet length variations to convey covert information.
Numerous research articles reflect the useful use of machine learning (ML) classification approaches to discover covert channels.
Therefore, this study presented an efficient ensemble classification model to detect such types of attacks.
The ensemble model consists of five machine learning algorithms representing the base classifiers.
The base classifiers include naive Bayes (NB), decision tree (DT), support vector machine (SVM), k-nearest neighbor (KNN), and random forest (RF).
Whereas, the logistic regression (LR) classifier was employed to aggregate the outputs of the base classifiers and thus to generate the ensemble classifier output.
The results showed a good performance of our proposed ensemble classifier.
It beats all single classification algorithms, with a 99.
3% accuracy rate and negligible classification errors.
</span>.

Related Results

Evaluation of the timing covert channel capacity considering packet transfer time distribution
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels ...
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased. Inter-...
Network Covert Channels
Network Covert Channels
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than e...
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Background: The covert or indirect type of aggression has a risk of converting in violent acts and, considering that, it is very important to identify it in order to apply effectiv...
Recovery of loss of packet in network using constant packet reordering
Recovery of loss of packet in network using constant packet reordering
When the packet is reordered the most standard implementation of the Transmission control protocol (TCP) gives poor performance. This paper proposes a new version of the TCP which ...
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification)....
Wave packet dynamics of the photodetachment ofH- near a metal surface
Wave packet dynamics of the photodetachment ofH- near a metal surface
The wave packet dynamics of the photodetachment of H- near metal surface is studied by using the wave packet evolution and the autocorrelation function. The results show that the e...
A New Sensors-Based Covert Channel on Android
A New Sensors-Based Covert Channel on Android
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their ...

Back to Top