Computer Science ›› 2015, Vol. 42 ›› Issue (2): 114-117.doi: 10.11896/j.issn.1002-137X.2015.02.024

Previous Articles     Next Articles

Approach Based on Recurrence Plot to Detect Covert Timing Channels

LIU Biao, LAN Shao-hua, ZHANG Jing and LIU Guang-jie   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The detection of covert timing channel is the focus of the research of covert channel,and it is very difficult.Entropy-based approach is the most effective detection approach.It can detect almost all the covert timing channels.However,Liquid is proposed soon after.It can effectively evade the entropy-based detection by smoothing the entropy.In this paper,a detection approach based on recurrence plot was introduced,and the detection approach can detect various covert timing channels including Liquid.

Key words: Covert timing channel,Recurrence plot,Network secure

[1] Lampson B W.A note on the confinement problem[J].Communications of the ACM,1973,6(10):613-615
[2] Girling C G.Covert channels in LAN’s[J].IEEE Trans.on Software Engineering,1987,SE-13(2):292-296
[3] Cabuk S,Brodley C E,Shields C.IP covert timing channels:Design and detection[C]∥Proc.of the 11th ACM Conf.on Computer and Communications Security.2004:178-187
[4] Cabuk S.Network Covert Channels:Design,Analysis,Detec-tion,and Elimination[D].Lafayette:Purdue University,2006
[5] Gianvecchio S,et al.Model-Based Covert Timing Channels:Automated Modeling and Evasion[J].Lecture Notes in Computer Science,2008,5230:211-230
[6] Liu Guang-jie,et al.Covert Timing Channel with DistributionMatch[C]∥International Conference on Multimedia Informations Networking and security.2009:565-568
[7] Shah G,Molina A,Blaze M.Keyboards and Covert Channels[C]∥Proceedings of the 15th conference on USENIX Security Symposium.2006:472-478
[8] Robert J Walls,Kush Kothari,Wright M.Liquid:A detection-resistant covert timing channel based on IPD shaping [J].Computer Networks,2011(55):1217-1228 (下转第149页)(上接第117页)
[9] Luo X,Chan E W W,Chang R K C.Cloak:A Ten-Fold Way for Reliable Covert Communications[C]∥Proc.European Symp.Research in Computer Security.Sept.2007
[10] Luo Xia-pu,et al.TCP covert timing channels:Design and detection[C]∥IEEE International Conference on Dependable Systems and Networks With FTCS and DCC.2008:420-429
[11] Peng P,Ning P,Reeves D.On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques[C]∥Proc.IEEE Symp.Security and Privacy.May 2006
[12] Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays[R].Technical Report,TR2005536.Department of Computer Science,Dartmouth College,2005:1-11
[13] Gianvecchio S,Wang H N.Detecting covert timing channels:An entropy-based approach[C]∥Proc.of the 14th ACM Conf.on Computer and Communications Security.2007:307-316
[14] Takens F.Detecting strange attractors in turbulence:Dynamical systems and turbulence[C]∥Rand D A,Young L S,eds.Lecture Notes in Mathematics.1981,366
[15] Eckmann J P,Kamphorst S O,Ruelle D.Recurrence Plots of Dynamical Systems [J].Europhysics Letter,1987,4:973-977
[16] Groth A.Visualization of coupling in time series by order recurrence plots[J].Phys.Rev.E,2005,72:046220
[17] Waikato VIII.http://wand.net.nz/wits/waikato/8

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!