Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Covert Channel Detection Using Machine Learning
Date
2021-01-07
Author
Çavuşoğlu, İmge Gamze
Alemdar, Hande
Onur, Ertan
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
540
views
0
downloads
Cite This
A covert channel is a communication method that misuses legitimate resources to bypass intrusion detection systems. They can be used to do illegal work like leaking classified (or sensitive) data or sending commands to malware bots. Network timing channels are a type of these channels that use inter-arrival times between network packets to encode the data to be sent. In this study, we worked with two types of network covert channels: Fixed Interval and Jitterbug. We were able to distinguish these channels from legitimate ones by using decision trees that use four statistical features (mean, variance, skewness, and kurtosis).
Subject Keywords
Covert Channel
,
Covert Channel Detection
,
Machine Learning
,
Decision Tree
URI
https://hdl.handle.net/11511/88454
DOI
https://doi.org/10.1109/siu49456.2020.9302098
Collections
Department of Computer Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Covert channel detection using machine learning methods
Çavuşoğlu, İmge Gamze; Alemdar, Hande; Department of Computer Engineering (2019)
A covert channel is a communication method that misuses legitimate resources to bypass intrusion detection systems. They can be used to do illegal work like leaking classified (or sensitive) data or sending commands to malware bots. Network timing channels are a type of these channels that use inter-arrival times between network packets to encode the data to be sent. Although these types of channels are hard to detect, they are not used frequently due to their low capacity and sensitivity to the network con...
Surveillance Video Querying With A Human-in-the-Loop
STONEBROKER, MICHAEL; Bhargava, Bharat; Cafarella, Michael; COLLINS, ZACHARY; McClellan, Jenna; SIPSER, AARON; Sun, Tao; NESEN, ALİNA; SOLAIMAN, K.M.A.; MANI, GANAPATHY; Kochpatcharin, Kevin; Kochpatcharin, Kevin; Angın, Pelin; MACDONALD, JAMES (2020-06-19)
SurvQ is a video monitoring system appropriate for surveillance applications such as those found in security and law enforcement. It performs real time object property identification and stores all data in a scalable DBMS. Standing queries implemented as database triggers are supported. SurvQ contains novel adaptive machine learning and algorithmic property classification. The application of SurvQ to assist the West Lafayette (IN) police department at identifying suspects in video is described. This paper a...
Automated Moving Object Classification in Wireless Multimedia Sensor Networks
Civelek, Muhsin; Yazıcı, Adnan (2017-02-15)
The use of wireless multimedia sensor networks (WMSNs) for surveillance applications has attracted the interest of many researchers. As with traditional sensor networks, it is easy to deploy and operate WMSNs. With inclusion of multimedia devices in wireless sensor networks, it is possible to provide data to users that is more meaningful than that provided by scalar sensor-based systems alone; however, producing, storing, processing, analyzing, and transmitting multimedia data in sensor networks requires co...
Feature Extraction and Object Classification for Target Identification at Wireless Multimedia Sensor Networks
Civelek, Muhsin; Yilmazer, Cengiz; Yazıcı, Adnan; Korkut, Fazli Oncul (2014-04-25)
In this paper, it is investigated the processes for automatic identification of the targets without personnel intervention in wireless multimedia sensor networks. Methods to extract the features of the object from the multimedia data and to classify the target type based on the extracted features are proposed within the scope of this study. The success of the proposed methods are tested by implementing a Matlab application and the results are presented in this paper
Human presence detection in emergency situations using deep learning based audio-visual systems
Geneci, İzlen; Günel Kılıç, Banu; Bozşahin, Hüseyin Cem; Department of Cognitive Sciences (2022-8-24)
The significance of emergency event detection in surveillance systems has drawn the attention of researchers in recent years. Existing methods mostly depend on visual data to identify any abnormal events since only visual sensors are frequently put in public settings. On the other hand, in an emergency, sound information may be exploited. When eyesight is occluded, audio waves can penetrate to some extent. Applications for visual analysis may be helpful when there is noise in the audio and the scene is cong...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
İ. G. Çavuşoğlu, H. Alemdar, and E. Onur, “Covert Channel Detection Using Machine Learning,” 2021, Accessed: 00, 2021. [Online]. Available: https://hdl.handle.net/11511/88454.