{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T23:57:49Z","timestamp":1698796669423},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T00:00:00Z","timestamp":1373673600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11235-013-9737-7","type":"journal-article","created":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T16:26:44Z","timestamp":1373646404000},"page":"333-343","source":"Crossref","is-referenced-by-count":8,"title":["Detection of TCP covert channel based on Markov model"],"prefix":"10.1007","volume":"54","author":[{"given":"Jiangtao","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Guangjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,13]]},"reference":[{"issue":"10","key":"9737_CR1","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. Lampson","year":"1973","unstructured":"Lampson, B. (1973). A note to the confinement problem. Communications of the ACM, 16(10), 613\u2013615.","journal-title":"Communications of the ACM"},{"issue":"1","key":"9737_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11235-009-9233-2","volume":"45","author":"S. G. Lian","year":"2010","unstructured":"Lian, S. G. (2010). Secure service convergence based on scalable media coding. Telecommunications Systems, 45(1), 21\u201335.","journal-title":"Telecommunications Systems"},{"key":"9737_CR3","doi-asserted-by":"crossref","unstructured":"Rowland, C. H. (1997). Covert channels in the TCP\/IP protocol suite. First Monday. Peer Reviewed Journal on the Internet.","DOI":"10.5210\/fm.v2i5.528"},{"key":"9737_CR4","first-page":"18","volume-title":"Proceedings of Texas workshop on security of information systems","author":"K. Ahsan","year":"2003","unstructured":"Ahsan, K., & Kundur, D. (2003). Practical data hiding in TCP\/IP. In Proceedings of Texas workshop on security of information systems (pp. 18\u201322)."},{"key":"9737_CR5","unstructured":"Hintz, A. (2003). Covert channels in TCP and IP headers. URL: http:\/\/www.defcon.org\/images\/\/dc10-hintz-covert.ppt ."},{"key":"9737_CR6","first-page":"18","volume-title":"Proceedings of 5th international workshop on information hiding","author":"G. Fisk","year":"2002","unstructured":"Fisk, G., Fisk, M., Papadopoulos, C., & Neil, J. (2002). Eliminating stegagography in Internet traffic with active wardens. In Proceedings of 5th international workshop on information hiding (pp. 18\u201335)."},{"key":"9737_CR7","first-page":"255","volume-title":"Proceedings of the 3rd international conference on risks and security of Internet and systems","author":"L. Frikha","year":"2008","unstructured":"Frikha, L., & Trabelsi, Z. (2008). A\u00a0new covet channel in WiFi networks. In Proceedings of the 3rd international conference on risks and security of Internet and systems (pp. 255\u2013260)."},{"key":"9737_CR8","unstructured":"Mazurczyk, W., Smolarczyk, M., & Szczypiorsky, K. Hiding information in retransmissions. Computing Research Repository (CoRR). arXiv:0905.0363 e-print archive, Ithaca: Cornell University. URL: http:\/\/arxiv.org\/abs\/0905.0363.2009 ."},{"key":"9737_CR9","first-page":"31","volume-title":"Proceedings of the 10th international multi-conference on advanced computer systems","author":"K. Szczypiorsky","year":"2003","unstructured":"Szczypiorsky, K. (2003). HICCUPS: hidden communication system for corrupted networks. In Proceedings of the 10th international multi-conference on advanced computer systems (pp. 31\u201340)."},{"issue":"10","key":"9737_CR10","first-page":"147","volume":"32","author":"X. Zou","year":"2006","unstructured":"Zou, X., Jin, H., Hao, K., & Sun, S. (2006). Communication hiding algorithm based on HTTP protocol parameters sorting. Computer Engineering, 32(10), 147\u2013149 (in Chinese).","journal-title":"Computer Engineering"},{"key":"9737_CR11","first-page":"445","volume-title":"Proceedings of 2009 international symposium on information engineering and electronic commerce","author":"L. Ji","year":"2009","unstructured":"Ji, L., Jiang, W., Dai, B., & Niu, X. (2009). A\u00a0novel covert channel based on length of message. In Proceedings of 2009 international symposium on information engineering and electronic commerce (pp. 445\u2013450)."},{"issue":"3","key":"9737_CR12","first-page":"121","volume":"39","author":"X. Zou","year":"2007","unstructured":"Zou, X. (2007). Covert channels based on command sequence of FTP protocol. Journal of Harbin Institute of Technology, 39(3), 121\u2013126 (in Chinese).","journal-title":"Journal of Harbin Institute of Technology"},{"key":"9737_CR13","first-page":"835","volume-title":"Proceedings of the 2nd international workshop on network information networking and security","author":"K. Szczypiorski","year":"2010","unstructured":"Szczypiorski, K., & Mazurczyk, W. (2010). Hiding data in OFDM symbols of IEEE 802.11 networks. In Proceedings of the 2nd international workshop on network information networking and security (pp. 835\u2013839)."},{"key":"9737_CR14","first-page":"3","volume":"49","author":"K. Szczypiorski","year":"2009","unstructured":"Szczypiorski, K. (2009). A performance analysis of HICCUPS-s steganographic system for WLAN. Telecommunication Systems Modeling, Analysis Design and Management, 49, 3\u20134.","journal-title":"Telecommunication Systems Modeling, Analysis Design and Management"},{"key":"9737_CR15","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/3-540-61996-8_29","volume-title":"Proceeding of the 1st international workshop of information hiding","author":"T. Handel","year":"1996","unstructured":"Handel, T., & Sandford, M. (1996). Hiding data in the OSI network model. In Proceeding of the 1st international workshop of information hiding (pp. 23\u201338)."},{"key":"9737_CR16","first-page":"55","volume-title":"Proceedings of the 2004 ACM conference on computer and communications security","author":"S. Cabuk","year":"2004","unstructured":"Cabuk, S., Brodley, C., & Shields, C. (2004). IP covert timing channels: design and detection. In Proceedings of the 2004 ACM conference on computer and communications security (pp. 55\u201374)."},{"issue":"8","key":"9737_CR17","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1016\/j.cose.2009.05.006","volume":"28","author":"L. Yao","year":"2009","unstructured":"Yao, L., Zi, X., Pan, L., & Li, J. (2009). A study of on\/off timing channel based on packet delay distribution. Computers & Security, 28(8), 785\u2013794.","journal-title":"Computers & Security"},{"issue":"2","key":"9737_CR18","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s11235-010-9368-1","volume":"49","author":"G. J. Liu","year":"2010","unstructured":"Liu, G. J., Zhai, J. T., & Dai, Y. W. (2010). Network covert timing channel with distribution matching. Telecommunications Systems, 49(2), 199\u2013205.","journal-title":"Telecommunications Systems"},{"key":"9737_CR19","unstructured":"Tumoian, E., & Anikeev, M. (2005). Detecting NUSHU covert channels using neural networks. Taganrog State University of Radio Engineering."},{"key":"9737_CR20","first-page":"1","volume-title":"Proceedings of information hiding workshop in 2005","author":"S. J. Murdoch","year":"2005","unstructured":"Murdoch, S. J., & Lewis, S. (2005). Embedding covert channels into TCP\/IP. In Proceedings of information hiding workshop in 2005 (pp. 1\u201315)."},{"key":"9737_CR21","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-540-39927-8_29","volume-title":"Proceedings of the 5th international conference of information and community security","author":"T. Sohn","year":"2003","unstructured":"Sohn, T., Seo, J., & Moon, J. (2003). A study on the covert channel detection of TCP\/IP header using support vector machine. In Proceedings of the 5th international conference of information and community security (pp. 313\u2013324)."},{"issue":"24","key":"9737_CR22","first-page":"136","volume":"33","author":"G. Liu","year":"2007","unstructured":"Liu, G., Dai, Y., et al. (2007). Steganlaysis against an IPIDs-based protocol stegagography. Computer Engineering, 33(24), 136\u2013137 (in Chinese).","journal-title":"Computer Engineering"},{"key":"9737_CR23","first-page":"178","volume-title":"Proceedings of the 2004 ACM conference on computer and communications security","author":"S. Cabuk","year":"2004","unstructured":"Cabuk, S., Brodley, C., & Shields, C. (2004). IP covert timing channels: design and detection. In Proceedings of the 2004 ACM conference on computer and communications security (pp. 178\u2013187)."},{"key":"9737_CR24","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/1315245.1315284","volume-title":"Proceedings of the 14th ACM conference on computer and communications security","author":"S. Gianvecchio","year":"2007","unstructured":"Gianvecchio, S., & Wang, H. (2007). Detecting covert timing channels: an entropy-based approach. In Proceedings of the 14th ACM conference on computer and communications security (pp. 307\u2013316)."},{"issue":"27","key":"9737_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C. Chang","year":"2011","unstructured":"Chang, C., & Lin, C.\u00a0J. (2011). LIBSVM: a\u00a0library for support vector machines. ACM Transactions on Intelligent Systems and Technology, 2(27), 1\u201327.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"9737_CR26","series-title":"The protocols","volume-title":"TCP\/IP illustrated","author":"W. Stevens","year":"1994","unstructured":"Stevens, W. (1994). TCP\/IP illustrated: Vol.\u00a01. The protocols. Reading: Addison-Wesley."},{"key":"9737_CR27","first-page":"3","volume-title":"Proceedings of the 1st IEEE international workshop on information assurance","author":"M. Estevez-Tapiador","year":"2003","unstructured":"Estevez-Tapiador, M., Garcia-Teodoro, P., & Diaz-Verdejo, E. (2003). Stochastic protocol modeling for anomaly based network intrusion detection. In Proceedings of the 1st IEEE international workshop on information assurance (pp. 3\u201312)."},{"issue":"1","key":"9737_CR28","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C. Cachin","year":"2004","unstructured":"Cachin, C. (2004). An information-theoretic model for steganography. Information and Computation, 192(1), 41\u201356.","journal-title":"Information and Computation"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9737-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-013-9737-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9737-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:15Z","timestamp":1559386215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-013-9737-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,13]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["9737"],"URL":"https:\/\/doi.org\/10.1007\/s11235-013-9737-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,13]]}}}