{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:51Z","timestamp":1773615891233,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080095","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"962-969","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Use of Beacon Signals to Detect Covert Channels in DNS Traffic"],"prefix":"10.3103","volume":"55","author":[{"given":"M. A.","family":"Eremeev","sequence":"first","affiliation":[]},{"given":"V. S.","family":"Nefedov","sequence":"additional","affiliation":[]},{"given":"A. S.","family":"Ostrovskii","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Semchenkov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7423_CR1","doi-asserted-by":"publisher","unstructured":"Jeun, I., Lee, Y., and Won, D., A practical study on advanced persistent threats, Computer Applications for Security, Control and System Engineering, Kim, T., Stoica, A., Fang, W., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., and Kang, B.-H., Eds., Communications in Computer and Information Science, vol. 339, Berlin: Springer, 2012, pp.\u00a0144\u2013152. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-35264-5_21","DOI":"10.1007\/978-3-642-35264-5_21"},{"key":"7423_CR2","doi-asserted-by":"publisher","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proc. 8th Int. Conf. on Security of Information and Networks, Sochi, Russia, 2015, New York: Association for Computing Machinery, 2015, pp. 142\u2013149. \u00a0https:\/\/doi.org\/10.1145\/2799979.2799995","DOI":"10.1145\/2799979.2799995"},{"key":"7423_CR3","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080144","journal-title":"Autom. Control Comput. Sci."},{"key":"7423_CR4","doi-asserted-by":"publisher","first-page":"659","DOI":"10.3103\/S0146411615080179","volume":"49","author":"D.P. Zegzhda","year":"2015","unstructured":"Zegzhda, D.P. and Stepanova, T.V., Approach to APCS protection from cyber threats, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 659\u2013664. \u00a0https:\/\/doi.org\/10.3103\/S0146411615080179","journal-title":"Autom. Control Comput. Sci."},{"key":"7423_CR5","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 295\u2013298. \u00a0https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"},{"key":"7423_CR6","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 7. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7423_CR7","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W., A note on the confinement problem, Commun. ACM, 1973, vol. 16, no. 10, pp. 613\u2013615. https:\/\/doi.org\/10.1145\/362375.362389","journal-title":"Commun. ACM"},{"key":"7423_CR8","unstructured":"Timonina, E.E., Analysis of threats of covert channels and methods for constructing the guaranteed protected distributed automated systems, Dr. Sci. (Eng.) Dissertation, Moscow: Russ. State Univ. for the Humanities, 2004."},{"key":"7423_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.14357\/19922264140405","volume":"8","author":"A.A. Grusho","year":"2014","unstructured":"Grusho, A.A., Grusho, N.A., and Timonina, E.E., The analysis of tags in covert channels, Inf. Ee Primen., 2014, vol. 8, no. 4, pp. 41\u201345. \u00a0https:\/\/doi.org\/10.14357\/19922264140405","journal-title":"Inf. Ee Primen."},{"key":"7423_CR10","unstructured":"MITRE ATT&CK(tm) is a curated knowledge base and model for cyber adversary behavior\u2026. https:\/\/attack.mitre.org\/techniques\/T1071\/."},{"key":"7423_CR11","unstructured":"MAWI Working group traffic archive. http:\/\/mawi.wide.ad.jp\/mawi\/. Cited February 17, 2020."},{"key":"7423_CR12","unstructured":"Stepanov, S.N., Teoriya teletrafika. Kontseptsii, modeli, prilozheniya (Theory of Teletraffic: Concepts, Models, Applications), Moscow: Goryachaya Liniya-Telekom, 2015."},{"key":"7423_CR13","unstructured":"Kondratenkov, G.S. and Frolov, A.Yu., Radiovidenie. Radiolokatsionnye sistemy distantsionnogo zondirovaniya Zemli (Radiovision: Radar Systems of Earth\u2019s Remote Sensing), Moscow: Radiotekhnika, 2005."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080095.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080095","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080095.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:28Z","timestamp":1773612388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":13,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7423"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080095","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"10 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}