A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007. ,
DOI : 10.1109/COMST.2007.4317620
Model-Based Covert Timing Channels: Automated Modeling and Evasion, Recent Advances in Intrusion Detection (RAID), 2008. ,
DOI : 10.1007/978-3-540-87403-4_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352
Covert TCP/IP Timing Channels: Theory to Implementation, Conference on Computer Communications (INFOCOM), 2009. ,
DOI : 10.1109/infcom.2009.5062145
End-to-end Internet packet dynamics, IEEE/ACM Transactions on Networking, vol.7, issue.3, pp.277-292, 1999. ,
DOI : 10.1109/90.779192
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.20
Limitations of End-to-End Encryption in Secure Computer Networks, 1978. ,
Detection of Covert Channel Encoding in Network Packet Delays, 2005. ,
Keyboards and Covert Channels, USENIX Security, 2006. ,
Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315284
TCP Covert Timing Channels: Design and Detection, IEEE/IFIP Conference on Dependable Systems and Networks (DSN), 2008. ,
Hide and Seek in Time ??? Robust Covert Timing Channels, European Symposium on Research in Computer Security, 2009. ,
DOI : 10.1109/ISIT.2007.4557351
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6748
Rapid identification of Skype traffic flows, Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, NOSSDAV '09, 2009. ,
DOI : 10.1145/1542245.1542266
Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements, Passive and Active Measurement (PAM) Workshop, pp.197-206, 2009. ,
DOI : 10.1007/978-1-4613-8122-8
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification, ACM SIGCOMM Computer Communication Review, vol.36, issue.5, 2006. ,
DOI : 10.1145/1163593.1163596
Decision-tree Discovery, chapter 16, pp.267-276, 2002. ,
Data mining, ACM SIGMOD Record, vol.31, issue.1, 2005. ,
DOI : 10.1145/507338.507355
Elements of Information Theory, 1991. ,
CCHEF -Covert Channels Evaluation Framework, 2007. ,
Cauchy Distribution for Jitter in IP Networks, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008), pp.35-40, 2008. ,
DOI : 10.1109/CONIELECOMP.2008.39
IP Packet Delay Variation Metric for IP Performance Metrics (IPPM) RFC 3393, IETF, 2002. ,
DOI : 10.17487/rfc3393