{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:54Z","timestamp":1750219854011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603888","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"614-620","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ConTra: A\u00a0Covert Timing\u00a0Channel Detection Approach for Little Covert Information in a Network"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7706-6734","authenticated-orcid":false,"given":"Zhiqiang","family":"Li","sequence":"first","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9030-0266","authenticated-orcid":false,"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[{"name":"Xiamen Key Laboratory of Data Security and Blockchain Technology, Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2680-6892","authenticated-orcid":false,"given":"Zhan","family":"Teng","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5666-4556","authenticated-orcid":false,"given":"Xuwen","family":"Huang","sequence":"additional","affiliation":[{"name":"Huaqiao University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"key":"e_1_3_2_1_2_1","volume-title":"I DPID it my way! A covert timing channel in software-defined networks[C]\/\/ 2018 IFIP Networking Conference (IFIP Networking) and Workshops","author":"Kr\u00f6sche R","year":"2018","unstructured":"Kr\u00f6sche R , Thimmaraju K , Schiff L , I DPID it my way! A covert timing channel in software-defined networks[C]\/\/ 2018 IFIP Networking Conference (IFIP Networking) and Workshops . Piscataway : IEEE , 2018 : 217-225. Kr\u00f6sche R, Thimmaraju K, Schiff L, I DPID it my way! A covert timing channel in software-defined networks[C]\/\/ 2018 IFIP Networking Conference (IFIP Networking) and Workshops. Piscataway: IEEE, 2018: 217-225."},{"key":"e_1_3_2_1_3_1","volume-title":"Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts[C]\/\/ Security and Privacy in Communication Networks: 15th EAI International Conference","author":"Cao J","year":"2019","unstructured":"Cao J , Sun K , Li Q , Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts[C]\/\/ Security and Privacy in Communication Networks: 15th EAI International Conference . Berlin : Springer , 2019 : 429-449. Cao J, Sun K, Li Q, Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts[C]\/\/ Security and Privacy in Communication Networks: 15th EAI International Conference. Berlin: Springer, 2019: 429-449."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233153"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1513601.1513604"},{"key":"e_1_3_2_1_7_1","volume-title":"Eliminating steganography in Internet traffic with active wardens[C]\/\/ Information Hiding: 5th International Workshop","author":"Fisk G","year":"2003","unstructured":"Fisk G , Fisk M , Papadopoulos C , Eliminating steganography in Internet traffic with active wardens[C]\/\/ Information Hiding: 5th International Workshop . Berlin : Springer , 2003 : 18-35. Fisk G, Fisk M, Papadopoulos C, Eliminating steganography in Internet traffic with active wardens[C]\/\/ Information Hiding: 5th International Workshop. Berlin: Springer, 2003: 18-35."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"e_1_3_2_1_9_1","volume-title":"Network covert channels: Design, analysis, detection, and elimination[D]","author":"Cabuk S.","year":"2006","unstructured":"Cabuk S. Network covert channels: Design, analysis, detection, and elimination[D] . Purdue University , 2006 . Cabuk S. Network covert channels: Design, analysis, detection, and elimination[D]. Purdue University, 2006."},{"key":"e_1_3_2_1_10_1","unstructured":"Shah G Molina A Blaze M. Keyboards and covert channels[C]\/\/ USENIX Security Symposium. 2006: 59\u221275.  Shah G Molina A Blaze M. Keyboards and covert channels[C]\/\/ USENIX Security Symposium. 2006: 59\u221275."},{"key":"e_1_3_2_1_11_1","volume-title":"Theory to implementation [C]\/\/ IEEE INFOCOM","author":"Sellke S H","year":"2009","unstructured":"Sellke S H , Wang C C , Bagchi S , TCP\/IP timing channels : Theory to implementation [C]\/\/ IEEE INFOCOM 2009 . Piscataway : IEEE , 2009: 2204-2212. Sellke S H, Wang C C, Bagchi S, TCP\/IP timing channels: Theory to implementation [C]\/\/ IEEE INFOCOM 2009. Piscataway: IEEE, 2009: 2204-2212."},{"key":"e_1_3_2_1_12_1","volume-title":"Detection of covert channel encoding in network packet delays[J]","author":"Berk V","year":"2005","unstructured":"Berk V , Giani A , Cybenko G. Detection of covert channel encoding in network packet delays[J] . 2005 . Berk V, Giani A, Cybenko G. Detection of covert channel encoding in network packet delays[J]. 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.46"},{"key":"e_1_3_2_1_14_1","first-page":"153","article-title":"The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels[C]\/\/ 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway","volume":"2015","author":"Darwish O","unstructured":"Darwish O , Al-Fuqaha A , Anan M , The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels[C]\/\/ 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway : IEEE , 2015 : 153 - 159 . Darwish O, Al-Fuqaha A, Anan M, The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels[C]\/\/ 2015 International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway: IEEE, 2015: 153-159.","journal-title":"IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1440"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2656078"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.11.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423680"},{"key":"e_1_3_2_1_19_1","volume-title":"Decision tree rule induction for detecting covert timing channels in TCP\/IP traffic[C]\/\/ International Cross-Domain Conference for Machine Learning and Knowledge Extraction","author":"Iglesias F","year":"2017","unstructured":"Iglesias F , Bernhardt V , Annessi R , Decision tree rule induction for detecting covert timing channels in TCP\/IP traffic[C]\/\/ International Cross-Domain Conference for Machine Learning and Knowledge Extraction . Berlin : Springer , 2017 : 105-122. Iglesias F, Bernhardt V, Annessi R, Decision tree rule induction for detecting covert timing channels in TCP\/IP traffic[C]\/\/ International Cross-Domain Conference for Machine Learning and Knowledge Extraction. Berlin: Springer, 2017: 105-122."},{"key":"e_1_3_2_1_20_1","volume-title":"Covert timing channel detection method based on random forest algorithm[C]\/\/ 2017 IEEE 17th International Conference on Communication Technology (ICCT)","author":"Li Q","year":"2017","unstructured":"Li Q , Zhang P , Chen Z , Covert timing channel detection method based on random forest algorithm[C]\/\/ 2017 IEEE 17th International Conference on Communication Technology (ICCT) . Piscataway : IEEE , 2017 : 165-171. Li Q, Zhang P, Chen Z, Covert timing channel detection method based on random forest algorithm[C]\/\/ 2017 IEEE 17th International Conference on Communication Technology (ICCT). Piscataway: IEEE, 2017: 165-171."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101952"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105546"},{"key":"e_1_3_2_1_23_1","volume-title":"Attention is all you need[J]. Advances in neural information processing systems","author":"Vaswani A","year":"2017","unstructured":"Vaswani A , Shazeer N , Parmar N , Attention is all you need[J]. Advances in neural information processing systems , 2017 , 30: 6000\u20136010. Vaswani A, Shazeer N, Parmar N, Attention is all you need[J]. Advances in neural information processing systems, 2017, 30: 6000\u20136010."},{"key":"e_1_3_2_1_24_1","volume-title":"An image is worth 16x16 words: Transformers for image recognition at scale[J]. arXiv preprint arXiv:2010.11929","author":"Dosovitskiy A","year":"2020","unstructured":"Dosovitskiy A , Beyer L , Kolesnikov A , An image is worth 16x16 words: Transformers for image recognition at scale[J]. arXiv preprint arXiv:2010.11929 , 2020 . Dosovitskiy A, Beyer L, Kolesnikov A, An image is worth 16x16 words: Transformers for image recognition at scale[J]. arXiv preprint arXiv:2010.11929, 2020."}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:11Z","timestamp":1750178831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":24,"alternative-id":["10.1145\/3603781.3603888","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603888","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}