• DocumentCode
    2737455
  • Title

    Automatic detection of illegal transmission in a network

  • Author

    Sangamdace, S. ; Ksirajudeen, K. ; Pradhapangr

  • Author_Institution
    Comput. Sci. & Eng., Dhaanish Ahmed Coll. of Eng., Chennai, India
  • fYear
    2012
  • fDate
    26-28 July 2012
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    An effective way to capturing data from a well-protected network, a covert timing channel manipulates the timing or ordering of network events like packet arrivals for secured information transfer over the Intranet, even without compromising an end-host within the network. On one hand, such information leakage caused by various covert timing channels poses a serious malwares to Internet users. On the other hand, detecting covert timing channels is a well known challenging task in the security community. Generally, the detection of illegal transmission channels uses statistical progress to differentiate covert traffic from legitimate traffic. However, due to the high variation in legitimate network traffic, detection methods based on standard statistical progress are not accurate and to motivate in capturing a covert timing channel. Although there have been recent research efforts on detecting covert timing channels over the Ftp protocol. Some covert channel detection methods are designed to target one specific covert timing channel, and therefore, fail to detect other types of covert timing channels. The other detection methods are broader in detection but are oversensitive to the high variation of network traffic. In short, none of the previous detection methodologies are effective at detecting a variety of covert timing channels Entropy Approach Detect in accurate manner.
  • Keywords
    Internet; entropy; intranets; telecommunication channels; telecommunication security; telecommunication traffic; FTP protocol; Internet users; Intranet; automatic detection; covert channel detection methods; covert timing channel; covert traffic; end-host; entropy approach detect; illegal transmission channels; information leakage; legitimate network traffic; legitimate traffic; network events; packet arrivals; secured information transfer; standard statistical progress; well-protected network; Artificial neural networks; Control systems; Grippers; Indium tin oxide; Internet; Receivers; Servers; Covert Traffic; Entropy Approach; Ftp protocol;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on
  • Conference_Location
    Coimbatore
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2012.6396056
  • Filename
    6396056