Javascript must be enabled to continue!
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
View through CrossRef
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased. Inter-arrival periods are used by these channels to steal sensitive data from targeted networks. Machine learning approaches are increasingly being used to detect CTCs, which use statistical-based measures to distinguish malicious (covert) traffic flows from genuine (overt) traffic flows. Given the attempts of cyber-attacks to elude detection and the expanding column of CTCs, covert channels detection must increase in both performance and precision in order to detect and prevent CTCs, as well as reduce the quality of service degradation caused by the detection process. We provide a new image-based method for fully autonomous vehicles in this research. Our strategy is based on the fact that covert channels provide communications that can be transformed into colored visuals. Our approach is based on this observation and is meant to detect and find the malicious part (i.e., a sequence of packets) within a traffic flow automatically. Our technique lowers the drop in service quality caused by blocking complete traffic flows in which hidden channels are found by finding the covert components within traffic flows. To detect covert traffic, we first convert traffic flows into colored images and then extract image-based attributes. We use these attributes to train a classifier on a huge dataset of covert and overt traffic. We use these attributes to train a classifier on a huge dataset of covert and overt traffic. This method achieves remarkable results, with a detection accuracy of 95.83 percent for cautious CTCs and a covert traffic accuracy of 97.83 percent for 8-bit covert messages, much above the capabilities of commonly used statistical-based solutions.
Eleyon Publishers
Title: A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
Description:
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased.
Inter-arrival periods are used by these channels to steal sensitive data from targeted networks.
Machine learning approaches are increasingly being used to detect CTCs, which use statistical-based measures to distinguish malicious (covert) traffic flows from genuine (overt) traffic flows.
Given the attempts of cyber-attacks to elude detection and the expanding column of CTCs, covert channels detection must increase in both performance and precision in order to detect and prevent CTCs, as well as reduce the quality of service degradation caused by the detection process.
We provide a new image-based method for fully autonomous vehicles in this research.
Our strategy is based on the fact that covert channels provide communications that can be transformed into colored visuals.
Our approach is based on this observation and is meant to detect and find the malicious part (i.
e.
, a sequence of packets) within a traffic flow automatically.
Our technique lowers the drop in service quality caused by blocking complete traffic flows in which hidden channels are found by finding the covert components within traffic flows.
To detect covert traffic, we first convert traffic flows into colored images and then extract image-based attributes.
We use these attributes to train a classifier on a huge dataset of covert and overt traffic.
We use these attributes to train a classifier on a huge dataset of covert and overt traffic.
This method achieves remarkable results, with a detection accuracy of 95.
83 percent for cautious CTCs and a covert traffic accuracy of 97.
83 percent for 8-bit covert messages, much above the capabilities of commonly used statistical-based solutions.
Related Results
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels ...
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Assuring encryption and security in cloud infrastructure
Assuring encryption and security in cloud infrastructure
The way organizations work has been totally changed by cloud computing, which gives versatile and reasonable arrangements for designing, implementing and overseeing applications. C...
Network Covert Channels
Network Covert Channels
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than e...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Background: The covert or indirect type of aggression has a risk of converting in violent acts and, considering that, it is very important to identify it in order to apply effectiv...
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
A Layered Approach For Improved Cloud Storage Security And Protection Of Access Policy
Information technology provides a service called cloud computing, which offers many beneficial functions. But there are a lot of problems and drawbacks with cloud computing, the mo...

