• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.
Citation: Wang Yongji, Wu Jingzheng, Ding Liping, Zeng Haitao. Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time[J]. Journal of Computer Research and Development, 2011, 48(8): 1542-1553.

Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time

More Information
  • Published Date: August 14, 2011
  • Concurrency conflicts may bring data conflict covert channel in multilevel secure systems. The existing covert channel detection methods have the following flaws: 1) Analyzing conflict records with single point, so the invaders can evade to be detected; 2) Using single indicator will bring false positive and false negative. We present a detection method based on conflict interval time called CTIBDA in this paper. This method solves the above problems: 1) Analyzing the conflict records with subject and object can prevent intruders from dispersing; 2) Using both the distribution and the sequence of intervals between transactions conflicts as indicators. The experimental results show that this approach can reduce the false positive and false negative and increase the accuracy. CTIBDA is suitable for online implementation and can be universally applied to concurrency conflict covert channels in other scenarios.
  • Related Articles

    [1]Chao Cheng, Pu Feifan, Xu Jianqiu, Gao Yunjun. Efficient Dimensionality Reduction and Query Algorithm of Trajectory Data Based on Spatial Position Relation[J]. Journal of Computer Research and Development, 2024, 61(7): 1771-1790. DOI: 10.7544/issn1000-1239.202330609
    [2]Wu Yue, Yuan Yongzhe, Yue Mingyu, Gong Maoguo, Li Hao, Zhang Mingyang, Ma Wenping, Miao Qiguang. Feature Mining Method of Multi-Dimensional Information Fusion in Point Cloud Registration[J]. Journal of Computer Research and Development, 2022, 59(8): 1732-1741. DOI: 10.7544/issn1000-1239.20220042
    [3]Xu Mengfan, Li Xinghua, Liu Hai, Zhong Cheng, Ma Jianfeng. An Intrusion Detection Scheme Based on Semi-Supervised Learning and Information Gain Ratio[J]. Journal of Computer Research and Development, 2017, 54(10): 2255-2267. DOI: 10.7544/issn1000-1239.2017.20170456
    [4]Wang Jun, Wei Jinmao, Zhang Lu. Multi-Task Feature Learning Algorithm Based on Preserving Classification Information[J]. Journal of Computer Research and Development, 2017, 54(3): 537-548. DOI: 10.7544/issn1000-1239.2017.20150963
    [5]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [6]Fang Minquan, Zhang Weimin, Zhou Haifang. Parallel Algorithm of Fast Independent Component Analysis for Dimensionality Reduction on Many Integrated Core[J]. Journal of Computer Research and Development, 2016, 53(5): 1136-1146. DOI: 10.7544/issn1000-1239.2016.20148080
    [7]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [8]Xu Junling, Zhou Yuming, Chen Lin, Xu Baowen. An Unsupervised Feature Selection Approach Based on Mutual Information[J]. Journal of Computer Research and Development, 2012, 49(2): 372-382.
    [9]Yan Guanghui and Li Zhanhuai. A Two Phases Unsupervised Sequential Forward Fractal Dimensionality Reduction Algorithm[J]. Journal of Computer Research and Development, 2008, 45(11): 1955-1964.
    [10]Xu Yan, Li Jintao, Wang Bin, Sun Chunming, Zhang Sen. A Study on Constraints for Feature Selection in Text Categorization[J]. Journal of Computer Research and Development, 2008, 45(4): 596-602.

Catalog

    Article views (836) PDF downloads (390) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return