In this paper, we study the identifying method of covert channels in database system and propose a more efficient, more authentic and safely isolated ...
Oct 22, 2024 · In this paper, we study the identifying method of covert channels in database system and propose a more efficient, more authentic and safely ...
This paper focuses on the analysis of the recent ways of using covert channels and detecting them, but also on the state-of-the-art possibilities of protection ...
Missing: Identifying Database
People also ask
What are the covert channel techniques?
What is an example of a covert channel?
What is covert timing channel detection?
This quantitative research study, focused on the single-subject experimental design, analyzed the ability of the novel Fedona Convolutional Neural Network (CNN)
Oct 22, 2024 · In this paper, selected ML methods are applied to detect popular network covert channels. The capacity of detecting and classifying covert ...
In this study, we worked with two types of network covert channels: Fixed Interval and Jitterbug. We were able to distinguish these channels from legitimate ...
Abstract: A practical method for the identification of covert storage channels is presented and its application to the source code of the Secure Xenix ...
Missing: Database | Show results with:Database
A covert channel is a logical channel used for sending hidden messages by leveraging information hiding technology over a public channel.
Missing: Database | Show results with:Database
The paper introduces a technique for detecting covert storage channels using a graph structure called an Information Flow Graph (IFG).
Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to hide the very existence of the communication.