Matches in SemOpenAlex for { <https://semopenalex.org/work/W4320341323> ?p ?o ?g. }
Showing items 1 to 93 of
93
with 100 items per page.
- W4320341323 endingPage "103125" @default.
- W4320341323 startingPage "103125" @default.
- W4320341323 abstract "In covert channel attacks, an adversary seeks various means to influence a tangible characteristic of a system, and then makes the systems leak information by measuring this characteristic. Covert channels are, by nature, very elusive. This makes it very difficult to identify them and defend against attacks that use these channels to leak sensitive information. Thus, they are a serious threat to the security of many systems. In this paper, we present two network timing covert channel attacks, and a defense mechanism against them. The purpose of the proposed attacks is to leak sensitive information between two logically separated (or isolated) networks that are hosted by a single router – one that is connected to the Internet, and another that is isolated and contains sensitive information. The attacks build on the fact that the response time of the router for a specific type of packet sent from a device that is connected to it is usually predictable, given the network topology. By interacting with the single shared router in a specific manner, an attacker can increase the router’s packet response time. The interaction is determined based on the information to be leaked, so the receiver (a computer located on the Internet-connected network) can measure the delayed packet response times and decode the sender’s signals (which operates from the isolated network) to receive classified information. The two classes of attacks presented in this work differ in the way that the delay is caused. In the cross-router covert channel (CRCC) attack, the sender overloads the router with control-plane packets; in the Wi-Fi micro-jamming attack, the sender uses a pre-installed implant to transmit single-tone signals in the 2.4GHz frequency range, disturbing the router’s packet transmissions. We showed that both attacks can influence a wide range of router brands and Wi-Fi capable devices and evaluated the optimal settings for both attacks when using different types of packets, transmission power, and data transmission rates. Our proposed defense mechanism is based on semi-supervised machine learning and deep learning algorithms, which are both used for novelty detection in network traffic. By detecting unusual traffic, we can identify the disturbances needed to leak the information. The system can then respond by blocking the suspicious devices that are involved in the attack. We evaluated the attacks in noisy and noise-free environments, successfully detecting both attacks in both environments. All the data and code, which includes the implementation of the attacks and the defense mechanism, is published as a benefit to the research community." @default.
- W4320341323 created "2023-02-13" @default.
- W4320341323 creator A5002731103 @default.
- W4320341323 creator A5008476535 @default.
- W4320341323 creator A5009840688 @default.
- W4320341323 creator A5019382663 @default.
- W4320341323 creator A5034209898 @default.
- W4320341323 creator A5046229987 @default.
- W4320341323 creator A5056475814 @default.
- W4320341323 creator A5078604496 @default.
- W4320341323 date "2023-04-01" @default.
- W4320341323 modified "2023-09-29" @default.
- W4320341323 title "Characterization and Detection of Cross-Router Covert Channels" @default.
- W4320341323 cites W1965334909 @default.
- W4320341323 cites W1993704367 @default.
- W4320341323 cites W2063705570 @default.
- W4320341323 cites W2099137371 @default.
- W4320341323 cites W2110769762 @default.
- W4320341323 cites W2340896621 @default.
- W4320341323 cites W2525268302 @default.
- W4320341323 cites W2889285628 @default.
- W4320341323 cites W4320341323 @default.
- W4320341323 doi "https://doi.org/10.1016/j.cose.2023.103125" @default.
- W4320341323 hasPublicationYear "2023" @default.
- W4320341323 type Work @default.
- W4320341323 citedByCount "1" @default.
- W4320341323 countsByYear W43203413232023 @default.
- W4320341323 crossrefType "journal-article" @default.
- W4320341323 hasAuthorship W4320341323A5002731103 @default.
- W4320341323 hasAuthorship W4320341323A5008476535 @default.
- W4320341323 hasAuthorship W4320341323A5009840688 @default.
- W4320341323 hasAuthorship W4320341323A5019382663 @default.
- W4320341323 hasAuthorship W4320341323A5034209898 @default.
- W4320341323 hasAuthorship W4320341323A5046229987 @default.
- W4320341323 hasAuthorship W4320341323A5056475814 @default.
- W4320341323 hasAuthorship W4320341323A5078604496 @default.
- W4320341323 hasConcept C103377522 @default.
- W4320341323 hasConcept C110875604 @default.
- W4320341323 hasConcept C111919701 @default.
- W4320341323 hasConcept C127162648 @default.
- W4320341323 hasConcept C138885662 @default.
- W4320341323 hasConcept C152174988 @default.
- W4320341323 hasConcept C158379750 @default.
- W4320341323 hasConcept C184842701 @default.
- W4320341323 hasConcept C198104137 @default.
- W4320341323 hasConcept C2775896111 @default.
- W4320341323 hasConcept C2779338814 @default.
- W4320341323 hasConcept C29024540 @default.
- W4320341323 hasConcept C31258907 @default.
- W4320341323 hasConcept C38652104 @default.
- W4320341323 hasConcept C41008148 @default.
- W4320341323 hasConcept C41065033 @default.
- W4320341323 hasConcept C41895202 @default.
- W4320341323 hasConcept C79974875 @default.
- W4320341323 hasConcept C86726114 @default.
- W4320341323 hasConceptScore W4320341323C103377522 @default.
- W4320341323 hasConceptScore W4320341323C110875604 @default.
- W4320341323 hasConceptScore W4320341323C111919701 @default.
- W4320341323 hasConceptScore W4320341323C127162648 @default.
- W4320341323 hasConceptScore W4320341323C138885662 @default.
- W4320341323 hasConceptScore W4320341323C152174988 @default.
- W4320341323 hasConceptScore W4320341323C158379750 @default.
- W4320341323 hasConceptScore W4320341323C184842701 @default.
- W4320341323 hasConceptScore W4320341323C198104137 @default.
- W4320341323 hasConceptScore W4320341323C2775896111 @default.
- W4320341323 hasConceptScore W4320341323C2779338814 @default.
- W4320341323 hasConceptScore W4320341323C29024540 @default.
- W4320341323 hasConceptScore W4320341323C31258907 @default.
- W4320341323 hasConceptScore W4320341323C38652104 @default.
- W4320341323 hasConceptScore W4320341323C41008148 @default.
- W4320341323 hasConceptScore W4320341323C41065033 @default.
- W4320341323 hasConceptScore W4320341323C41895202 @default.
- W4320341323 hasConceptScore W4320341323C79974875 @default.
- W4320341323 hasConceptScore W4320341323C86726114 @default.
- W4320341323 hasLocation W43203413231 @default.
- W4320341323 hasOpenAccess W4320341323 @default.
- W4320341323 hasPrimaryLocation W43203413231 @default.
- W4320341323 hasRelatedWork W2036486955 @default.
- W4320341323 hasRelatedWork W2119972733 @default.
- W4320341323 hasRelatedWork W2360953516 @default.
- W4320341323 hasRelatedWork W2489870266 @default.
- W4320341323 hasRelatedWork W2501800521 @default.
- W4320341323 hasRelatedWork W2600339792 @default.
- W4320341323 hasRelatedWork W2965212260 @default.
- W4320341323 hasRelatedWork W2967045922 @default.
- W4320341323 hasRelatedWork W3007114941 @default.
- W4320341323 hasRelatedWork W3148924752 @default.
- W4320341323 hasVolume "127" @default.
- W4320341323 isParatext "false" @default.
- W4320341323 isRetracted "false" @default.
- W4320341323 workType "article" @default.