JOURNAL ARTICLE

Covert Channel Detection Methods

Adrian OndovPavol Helebrandt

Year: 2022 Journal:   2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA) Pages: 491-496

Abstract

The modern networking world is being exposed to many risks more frequently every day. Most of systems strongly rely on remaining anonymous throughout the whole endpoint exploitation process. Covert channels represent risk since they ex-ploit legitimate communications and network protocols to evade typical filtering. This firewall avoidance sees covert channels frequently used for malicious communication of intruders with systems they compromised, and thus a real threat to network security. While there are commercial tools to safeguard computer networks, novel applications such as automotive connectivity and V2X present new challenges. This paper focuses on the analysis of the recent ways of using covert channels and detecting them, but also on the state-of-the-art possibilities of protection against them. We investigate observing the timing covert channels behavior simulated via injected ICMP traffic into standard network communications. Most importantly, we concentrate on enhancing firewall with detection and prevention of such attack built-in features. The main contribution of the paper is design for detection timing covert channel threats utilizing detection methods based on statistical analysis. These detection methods are combined and implemented in one program as a simple host-based intrusion detection system (HIDS). As a result, the proposed design can analyze and detect timing covert channels, with the addition of taking preventive measures to block any future attempts to breach the security of an end device.

Keywords:
Covert channel Computer science Firewall (physics) Covert Intrusion detection system Computer security Network security Computer network Channel (broadcasting)

Metrics

3
Cited By
0.24
FWCI (Field Weighted Citation Impact)
21
Refs
0.44
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

IP Covert Channel Detection

Serdar CabukCarla E. BrodleyClay Shields

Journal:   ACM Transactions on Information and System Security Year: 2009 Vol: 12 (4)Pages: 1-29
JOURNAL ARTICLE

WLAN covert timing channel detection

Hong ZhaoMinxiou Chen

Year: 2015 Pages: 1-5
JOURNAL ARTICLE

Covert channel detection using Information Theory

Loı̈c HélouëtAline Roumy

Journal:   Electronic Proceedings in Theoretical Computer Science Year: 2011 Vol: 51 Pages: 34-51
JOURNAL ARTICLE

Covert Channel Detection: Machine Learning Approaches

Muawia A. ElsadigAhmed Gafar

Journal:   IEEE Access Year: 2022 Vol: 10 Pages: 38391-38405
© 2026 ScienceGate Book Chapters — All rights reserved.