Web tap: Detecting covert web traffic (2004)

by Kevin Borders , Atul Prakash
Venue:In Proceedings of the 11th ACM Conference on Computer and Communication Security
Citations:34 - 2 self

Documents Related by Co-Citation

45 Ip covert timing channels: design and detection – Serdar Cabuk - 2004
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
769 Tor: The Second-Generation Onion Router – Roger Dingledine, Nick Mathewson, Paul Syverson - 2004
44 Embedding covert channels into TCP/IP – Steven J. Murdoch, Stephen Lewis - 2005
14 BINDER: An Extrusionbased Break-in Detector for Personal Computers – Weidong Cui, Y H. Katz, Wai-tian Tan - 2005
79 Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Interpacket Delays – Xinyuan Wang, Douglas S. Reeves - 2003
59 Behavior-based spyware detection – Engin Kirda, Christopher Kruegel, Greg Banks, Giovanni Vigna, Richard A. Kemmerer - 2006
37 Covert messaging through TCP timestamps – John Gi N, Rachel Greenstadt, Peter Litwack, Richard Tibbetts - 2002
55 Measurement and Analysis of Spyware in a University Environment – Stefan Saroiu, Steven D. Gribble, Henry M. Levy - 2004
159 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Helen J. Wang, Chuanxiong Guo, Chuanxiong Guo, Daniel R. Simon, Daniel R. Simon, Alf Zugenmaier, Alf Zugenmaier - 2004
134 BLINC: Multilevel Traffic Classification in the Dark – Thomas Karagiannis, Konstantina Papagiannaki, Michalis Faloutsos - 2005
35 Eliminating steganography in Internet traffic with active wardens – Gina Fisk, Mike Fisk, Christos Papadopoulos, Josh Neil - 2002
8 The implementation of passive covert channels in the Linux kernel. Available: http://invisiblethings.org/papers.html – Joanna Rutkowska
44 Covert channels in the TCP/IP protocol suite – C H Rowland - 1997
30 Practical Data Hiding in TCP/IP – Kamran Ahsan, Deepa Kundur - 2002
37 and M.Sandford, “Hiding data in the OSI network model – T Handel
821 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
2 Siren: Detecting evasive malware (short paper – K Borders, X Zhao, A Prakash - 2006
210 Polygraph: Automatically generating signatures for polymorphic worms – James Newsome - 2005