{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:29:24Z","timestamp":1766068164871,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_19","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:11Z","timestamp":1741867931000},"page":"387-406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying the\u00a0Origins of\u00a0Business Data Breaches Through CTC Detection"],"prefix":"10.1007","author":[{"given":"Gayle L.","family":"Frisbier","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8346-7148","authenticated-orcid":false,"given":"Omar","family":"Darwish","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1506-7924","authenticated-orcid":false,"given":"Anas","family":"Alsobeh","sequence":"additional","affiliation":[]},{"given":"Abdallah","family":"Al-shorman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Okhravi, H., Bak, S., King, S.T.: Design, implementation and evaluation of covert channel attacks. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp. 481\u2013487. IEEE, November 2010","DOI":"10.1109\/THS.2010.5654967"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MM.2016.83","volume":"36","author":"G Venkataramani","year":"2016","unstructured":"Venkataramani, G., Chen, J., Doroslovacki, M.: Detecting hardware covert timing channels. IEEE Micro 36(5), 17\u201327 (2016)","journal-title":"IEEE Micro"},{"key":"19_CR3","unstructured":"Verizon, Arcila, C., Pritam, N., Rowntree, L.: 2023 Data Breach Investigations Report: Frequency and cost of social engineering attacks skyrocket (2023). https:\/\/www.verizon.com\/about\/news\/2023-data-breach-investigations-report?msockid=3d0759a516106c310e284caf175f6de6"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Goher, S.Z., Javed, B., Saqib, N.A.: Covert channel detection: A survey based analysis. In: High Capacity Optical Networks and Emerging\/Enabling Technologies, pp. 057\u2013065. IEEE, December 2012","DOI":"10.1109\/HONET.2012.6421435"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.R., Schulz, S., Katzenbeisser, S.: Hide and seek in time-robust covert timing channels. In: Computer Security-ESORICS 2009: 14th European Symposium on Research in Computer Security. Saint-Malo, France, September 21\u201323: Proceedings 14, pp. 120\u2013135. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-04444-1_8"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Classen, J., Schulz, M., Hollick, M.: Practical covert channels for WiFi systems. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 209\u2013217. IEEE, September 2015","DOI":"10.1109\/CNS.2015.7346830"},{"key":"19_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101952","volume":"97","author":"J Han","year":"2020","unstructured":"Han, J., Huang, C., Shi, F., Liu, J.: Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97, 101952 (2020)","journal-title":"Comput. Secur."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chourib, M.: Detecting selected network covert channels using machine learning. In: 2019 International Conference on High Performance Computing & Simulation (HPCS), pp. 582\u2013588. IEEE, July 2019","DOI":"10.1109\/HPCS48598.2019.9188115"},{"key":"19_CR9","doi-asserted-by":"publisher","unstructured":"Zander, S., Armitage, G., Branch, P.: Stealthier Inter-packet Timing Covert Channels. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011. LNCS, vol. 6640, pp. 458\u2013470. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20757-0_36","DOI":"10.1007\/978-3-642-20757-0_36"},{"issue":"6","key":"19_CR10","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1049\/iet-ifs.2017.0394","volume":"12","author":"G Xu","year":"2018","unstructured":"Xu, G., Yang, W., Huang, L.: Supervised learning framework for covert channel detection in LTE-A. IET Inf. Secur. 12(6), 534\u2013542 (2018)","journal-title":"IET Inf. Secur."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, M.A., Pai, A.H., Agarwal, J., Christa, S., Prasad, G.M., Saifi, S.: Deep learning model to defend against covert channel attacks in the SDN networks. In: 2023 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA), pp. 1\u20135. IEEE, January 2023","DOI":"10.1109\/ACCTHPA57160.2023.10083336"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Sun, Y., Zhang, L., Zhao, C.: A study of network covert channel detection based on deep learning. In: 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), pp. 637\u2013641. IEEE, May 2018","DOI":"10.1109\/IMCEC.2018.8469669"},{"key":"19_CR13","unstructured":"Pe\u00f1a, T. A. (2020). A deep learning approach to detecting covert channels in the domain name system. Capitol Technology University"},{"key":"19_CR14","unstructured":"Saeli, S., Bisio, F., Lombardo, P., Massa, D.: DNS covert channel detection via behavioral analysis: a machine learning approach (2020). arXiv preprint arXiv:2010.01582"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Massimi, F., Benedetto, F.: Deep learning-based detection methods for covert communications in E-health transmissions. In: 2022 45th International Conference on Telecommunications and Signal Processing (TSP), pp. 11\u201316. IEEE, July 2022","DOI":"10.1109\/TSP55681.2022.9851366"},{"issue":"2","key":"19_CR16","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2015","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secure Comput. 13(2), 274\u2013283 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"23","key":"19_CR17","first-page":"7035","volume":"100","author":"M Elsadig","year":"2022","unstructured":"Elsadig, M., Gafar, A.: Packet length covert channel detection: an ensemble machine learning approach. J. Theor. Appl. Inf. Technol. 100(23), 7035\u20137043 (2022)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/ACCESS.2020.3046234","volume":"9","author":"S Al-Eidi","year":"2020","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y., Husari, G.: SnapCatch: automatic detection of covert timing channels using image processing and machine learning. IEEE Access 9, 177\u2013191 (2020)","journal-title":"IEEE Access"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"38391","DOI":"10.1109\/ACCESS.2022.3164392","volume":"10","author":"MA Elsadig","year":"2022","unstructured":"Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391\u201338405 (2022)","journal-title":"IEEE Access"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Darwish, O., Al-shorman, A., AlSobeh, A., Tashtoush, Y.: A Survey Analysis of Internet of Things (IoT) Education Across the Top 25 Universities in the United States. In: International Conference on Advanced Information Networking and Applications, pp. 497\u2013510. Springer, Cham, April 2024","DOI":"10.1007\/978-3-031-57931-8_47"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Darwish, O., Al-Eidi, S., Al-Shorman, A., AlSobeh, A., Maabreh, M., Tashtoush, Y.: LinguTimeX: Explainable AI of Natural Language Detection in Leakage Information with Covert Timing Channels (2024)","DOI":"10.21203\/rs.3.rs-4372354\/v1"},{"key":"19_CR22","unstructured":"Allied Market Research. Utility Vehicle Market Statistics 2030 (2022). https:\/\/www.alliedmarketresearch.com\/utility-vehicle-market-A12422"},{"key":"19_CR23","unstructured":"Willoughby, C., Early, E., Holcomb, R., Reed, K.: Market Research Study: Organic Fruit, Vegetable and Herb Production. FAPC-152, Oklahoma State University, June 2017. https:\/\/extension.okstate.edu\/fact-sheets\/print-publications\/fapc-food-and-agricultural-products-center\/market-research-study-organic-fruit-vegetable-and-herb-production-fapc-152.pdf"},{"key":"19_CR24","unstructured":"Grand View Research. Electric Vehicle Market Size, Report Overview (2023). https:\/\/www.grandviewresearch.com\/industry-analysis\/electric-utility-vehicle-market-report"},{"key":"19_CR25","unstructured":"Grand View Research. Paper Straw Market Size & Trends (2023). https:\/\/www.grandviewresearch.com\/industry-analysis\/paper-straw-market"},{"key":"19_CR26","unstructured":"Lululemon. Annual Report (2022). https:\/\/corporate.lululemon.com\/~\/media\/Files\/L\/Lululemon\/investors\/annual- reports\/lululemon-2022-annual-report.pdf"},{"key":"19_CR27","unstructured":"Postelnyak, M.: Top 10 Sample HR Emails to Employees. Contact Monkey, 12 Feb 2024. https:\/\/www.contactmonkey.com\/blog\/sample-hr-email-to-employees"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"AlSobeh, A.M., Gaber, K., Hammad, M.M., Nuser, M., Shatnawi, A.: Android malware detection using time-aware machine learning approach. Cluster Computing, 1\u201322 (2024)","DOI":"10.1007\/s10586-024-04484-6"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:28Z","timestamp":1741867948000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare no competing interests relevant to the content of this article. All authors contributed to this work and have no financial or personal relationships that could influence the results reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}