A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine |
손태식
(고려대학교)
서정우 (고려대학교) 서정택 (국가보안기술연구소) 문종섭 (고려대학교) 최홍민 (㈜씨큐브) |
1 | C. H. Rowland, Covert channels in the TCP/IP protocol suite, Tech. Rep. 5, First Monday, Peer Reviewed Journal on the Internet, July 1997 |
2 | Daemon9, 'Loki: ICMP Tunneling', Pharack Magazine, Vol.6, Issue 49, article 6 of 16 |
3 | John Giffin, Covert Messaging Through TCP Timestamps, PET2002, pp. 194-208, Apr 2002 |
4 | Vapnik V., The Nature of Statistical Learning Theory, Springer-Verlag, New-York, 1995 |
5 | J. McHugh, Covert Channel Analysis, Technical Memorundum 5540:080A, Naval Research Laboratory, Washington D.C., 1995. A Chapter of the Handbook for the Computer Security Certification of Trusted Systems |
6 | Neil F. Johnson et al, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, Kluwer Academic Publishers, 2000 |
7 | 'Properties of Support Vect or Machines,' A.I. Memo No. 1612; CBCL paper No. 152, Massachusetts Institute of Technology. Cambridge, 1997 |
8 | Department of defence trusted computer system evaluation criteria, Tech. Rep. DOD 5200.28-ST. Department of Defence, Dec 1985. Supersedes CSC-STD-001-83 |
9 | C. Campbell and N. Cristianini, Simple Learning Algorithms for Training Support Vector Machines, Technical report, University of Bristol. 1998 |
10 | B. W. Lampson, A note on the confinment problem, in Proc. of the Communications of the ACM, no. 16:10, pp. 613-615, Oct 1973 |
11 | S. Mukkamala, G. Janowski, A. H. Sung. Intrusion Detection Using Neural Networks and Support Vector Machines, Proceedings of IEEE IJCNN, pp.1702-1707, May 2002 |
12 | K. Ahsan and D. Kundur, 'Practical Data Hiding in TCP/IP,' Proc. Workshop on Multimedia Security at ACM Multimedia '02, 7 pages, French Riviera, Dec 2002 |
13 | Fabien A. P. Petitcolas, editor. Information hiding, Proceedings of the 5th international workshop on information hiding. LNCS 2578. Noordwijkerhout The Netherlands, Oct 2002 |
14 | Dorothy E Denning, An Intrusion Detection Model, In IEEE Transactions on SE, Number 2, pp. 222-250, Feb. 1997 |
15 | Joachmims T, mySVM - a Support Vector Machine, Univerity Dortmund, 1999 |