{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T08:44:30Z","timestamp":1773305070230,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T00:00:00Z","timestamp":1685750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10586-023-04035-5","type":"journal-article","created":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T20:29:17Z","timestamp":1685824157000},"page":"1655-1665","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A deep learning approach for detecting covert timing channel attacks using sequential data"],"prefix":"10.1007","volume":"27","author":[{"given":"Shorouq","family":"Al-Eidi","sequence":"first","affiliation":[]},{"given":"Omar","family":"Darwish","sequence":"additional","affiliation":[]},{"given":"Yuanzhu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Majdi","family":"Maabreh","sequence":"additional","affiliation":[]},{"given":"Yahya","family":"Tashtoush","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,3]]},"reference":[{"issue":"8","key":"4035_CR1","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.3390\/s20082417","volume":"20","author":"S Al-Eidi","year":"2020","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y.: Covert timing channel analysis either as cyber attacks or confidential applications. Sensors 20(8), 2417 (2020)","journal-title":"Sensors"},{"key":"4035_CR2","doi-asserted-by":"publisher","first-page":"38391","DOI":"10.1109\/ACCESS.2022.3164392","volume":"10","author":"MA Elsadig","year":"2022","unstructured":"Elsadig, M.A., Gafar, A.: Covert channel detection: machine learning approaches. IEEE Access 10, 38391\u201338405 (2022)","journal-title":"IEEE Access"},{"key":"4035_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105546","volume":"82","author":"O Darwish","year":"2019","unstructured":"Darwish, O., Al-Fuqaha, A., Brahim, G.B., Jenhani, I., Vasilakos, A.: Using hierarchical statistical analysis and deep neural networks to detect covert timing channels. Appl. Soft Comput. 82, 105546 (2019)","journal-title":"Appl. Soft Comput."},{"key":"4035_CR4","unstructured":"Saeli, S., Bisio, F., Lombardo, P., Massa, D.: DNS covert channel detection via behavioral analysis: a machine learning approach. arXiv preprint arXiv:2010.01582 (2020)"},{"key":"4035_CR5","doi-asserted-by":"crossref","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y., Husari, G.: Snapcatch: Automatic detection of covert timing channels using image processing and machine learning. IEEE Access (2020)","DOI":"10.1109\/ACCESS.2020.3046234"},{"key":"4035_CR6","doi-asserted-by":"crossref","unstructured":"Chourib, M.: Detecting selected network covert channels using machine learning. In: 2019 International Conference on High Performance Computing & Simulation (HPCS), pp. 582\u2013588 . IEEE (2019)","DOI":"10.1109\/HPCS48598.2019.9188115"},{"key":"4035_CR7","doi-asserted-by":"crossref","unstructured":"Iglesias, F., Bernhardt, V., Annessi, R., Zseby, T.: Decision tree rule induction for detecting covert timing channels in tcp\/ip traffic. In: International Cross-Domain Conference for Machine Learning and Knowledge Extraction, pp. 105\u2013122 . Springer (2017)","DOI":"10.1007\/978-3-319-66808-6_8"},{"key":"4035_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101952","volume":"97","author":"J Han","year":"2020","unstructured":"Han, J., Huang, C., Shi, F., Liu, J.: Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97, 101952 (2020)","journal-title":"Comput. Secur."},{"key":"4035_CR9","unstructured":"Salih, A., Ma, X., Peytchev, E.: Detection and classification of covert channels in ipv6 using enhanced machine learning (2015)"},{"key":"4035_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3207573","author":"H Li","year":"2022","unstructured":"Li, H., Song, T., Yang, Y.: Generic and sensitive anomaly detection of network covert timing channels. IEEE Trans. Dependable Secure Comput. (2022). https:\/\/doi.org\/10.1109\/TDSC.2022.3207573","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4035_CR11","doi-asserted-by":"crossref","unstructured":"Al-Eidi, S., Darwish, O., Chen, Y., Elkhodr, M.: Covert timing channels detection based on image processing using deep learning. In: International Conference on Advanced Information Networking and Applications, pp. 546\u2013555. Springer (2022)","DOI":"10.1007\/978-3-030-99619-2_51"},{"key":"4035_CR12","doi-asserted-by":"crossref","unstructured":"Al-Eidi, S., Darwish, O., Husari, G., Chen, Y., Elkhodr, M.: Convolutional neural network structure to detect and localize ctc using image processing. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/IEMTRONICS55184.2022.9795734"},{"key":"4035_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.107398","volume":"151","author":"S Kiranyaz","year":"2021","unstructured":"Kiranyaz, S., Avci, O., Abdeljaber, O., Ince, T., Gabbouj, M., Inman, D.J.: 1D convolutional neural networks and applications: a survey. Mech. Syst. Signal Process. 151, 107398 (2021)","journal-title":"Mech. Syst. Signal Process."},{"key":"4035_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103498","volume":"131","author":"B Lindemann","year":"2021","unstructured":"Lindemann, B., Maschler, B., Sahlab, N., Weyrich, M.: A survey on anomaly detection for technical systems using lstm networks. Comput. Ind. 131, 103498 (2021)","journal-title":"Comput. Ind."},{"issue":"2","key":"4035_CR15","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TDSC.2015.2423680","volume":"13","author":"PL Shrestha","year":"2015","unstructured":"Shrestha, P.L., Hempel, M., Rezaei, F., Sharif, H.: A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secure Comput. 13(2), 274\u2013283 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"4035_CR16","doi-asserted-by":"crossref","unstructured":"Iglesias, F., Zseby, T.: Are network covert timing channels statistical anomalies? In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 1\u20139 (2017)","DOI":"10.1145\/3098954.3106067"},{"key":"4035_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105546","volume":"82","author":"O Darwish","year":"2019","unstructured":"Darwish, O., Al-Fuqaha, A., Brahim, G.B., Jenhani, I., Vasilakos, A.: Using hierarchical statistical analysis and deep neural networks to detect covert timing channels. Appl. Soft Comput. 82, 105546 (2019)","journal-title":"Appl. Soft Comput."},{"key":"4035_CR18","doi-asserted-by":"crossref","unstructured":"Agarap, A.F.M.: A neural network architecture combining gated recurrent unit (gru) and support vector machine (svm) for intrusion detection in network traffic data. In: Proceedings of the 2018 10th International Conference on Machine Learning and Computing, pp. 26\u201330 (2018)","DOI":"10.1145\/3195106.3195117"},{"key":"4035_CR19","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.knosys.2018.08.036","volume":"163","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B., Liu, M., Yan, H.: CNN and RNN based payload classification methods for attack detection. Knowl.-Based Syst. 163, 332\u2013341 (2019)","journal-title":"Knowl.-Based Syst."},{"key":"4035_CR20","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, H.: An effective intrusion detection classifier using long short-term memory with gradient descent optimization. In: 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20136 . IEEE (2017)","DOI":"10.1109\/PlatCon.2017.7883684"},{"key":"4035_CR21","doi-asserted-by":"crossref","unstructured":"Sharma, A., Malacaria, P., Khouzani, M.: Malware detection using 1-dimensional convolutional neural networks. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 247\u2013256. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00034"},{"key":"4035_CR22","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., Zeng, X., Yang, Z.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348 . IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"key":"4035_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3806459","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani, H., Aldhyani, T.H.: Botnet attack detection by using CNN\u2013LSTM model for internet of things applications. Security Commun. Netw. (2021). https:\/\/doi.org\/10.1155\/2021\/3806459","journal-title":"Security Commun. Netw."},{"issue":"10","key":"4035_CR24","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff, K., Srivastava, R.K., Koutn\u00edk, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: a search space odyssey. IEEE Trans. Neural Netw. Learn. Syst. 28(10), 2222\u20132232 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04035-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04035-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04035-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T19:34:14Z","timestamp":1729539254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04035-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,3]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["4035"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04035-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,3]]},"assertion":[{"value":"28 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}