Towards a Streaming Approach to the Mitigation of Covert Timing Channels

Omar Darwish, Ala Al-Fuqaha, Ghassen Ben Brahim, Ilyes Jenhani, Muhammad Anan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Leaking data using covert timing channels is considered as a critical threat in network communication. These type of channels use the time between inter-arrival packets to pass information between different processes, making it a very critical to design techniques to eliminate and mitigate such channels; hence, ensuring a more secure communication environment. This paper proposes a new online streaming approach to the mitigation of covert timing channels. The new approach eliminates covert timing channels while having a little impact on the overall Quality of Service (QoS). A classification-based strategy was used to test the performance of the proposed mitigation model. In fact, we showed that the classification accuracy of a classifier model trained and tested on a mitigated flow fell down to 50% compared to the same classifier model when trained and tested on the same flow before mitigation indicating that the classifier is no longer able to distinguish between covert and overt channels.

Original languageEnglish
Title of host publication2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages255-260
Number of pages6
ISBN (Print)9781538620700
DOIs
Publication statusPublished - 28 Aug 2018
Externally publishedYes
Event14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018 - Limassol, Cyprus
Duration: 25 Jun 201829 Jun 2018

Publication series

Name2018 14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018

Conference

Conference14th International Wireless Communications and Mobile Computing Conference, IWCMC 2018
Country/TerritoryCyprus
CityLimassol
Period25/06/1829/06/18

Keywords

  • Classification
  • Covert Channels
  • Mitigation
  • QoS
  • Security

Fingerprint

Dive into the research topics of 'Towards a Streaming Approach to the Mitigation of Covert Timing Channels'. Together they form a unique fingerprint.

Cite this