Your browser doesn't support javascript.
loading
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications.
Al-Eidi, Shorouq; Darwish, Omar; Chen, Yuanzhu.
Afiliação
  • Al-Eidi S; Computer Science Department, Memorial University of Newfoundland, St. John's, NL A1B 3R7, Canada.
  • Darwish O; Computer Information System Department, Ferrum College, Ferrum, VA 24088, USA.
  • Chen Y; Computer Science Department, Memorial University of Newfoundland, St. John's, NL A1B 3R7, Canada.
Sensors (Basel) ; 20(8)2020 Apr 24.
Article em En | MEDLINE | ID: mdl-32344534
Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies.
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2020 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Idioma: En Revista: Sensors (Basel) Ano de publicação: 2020 Tipo de documento: Article