Protocol-independent Detection of "Messaging Ordering" Network Covert Channels.
Steffen WendzelPublished in: ARES (2019)
Keyphrases
- computer networks
- network simulator
- lightweight
- network structure
- peer to peer
- detection algorithm
- multi channel
- communication channels
- network protocols
- anomaly detection
- end hosts
- communication networks
- virtual private network
- false alarms
- authentication protocol
- channel assignment
- wireless mesh networks
- tcp ip
- network devices
- terrorist networks
- denial of service attacks
- key players
- packet filtering
- wireless sensor networks
- ip address
- application layer
- information flow
- network security
- false positives
- wireless networks
- object detection