{"id":"https://openalex.org/W1958789226","doi":"https://doi.org/10.1007/978-3-642-20757-0_36","title":"Stealthier Inter-packet Timing Covert Channels","display_name":"Stealthier Inter-packet Timing Covert Channels","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1958789226","doi":"https://doi.org/10.1007/978-3-642-20757-0_36","mag":"1958789226"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-20757-0_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-20757-0_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01583422","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063641658","display_name":"Sebastian Zander","orcid":"https://orcid.org/0000-0002-2084-7204"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Sebastian Zander","raw_affiliation_strings":["Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075839939","display_name":"Grenville Armitage","orcid":"https://orcid.org/0000-0002-2805-6511"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Grenville Armitage","raw_affiliation_strings":["Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064991441","display_name":"Philip Branch","orcid":"https://orcid.org/0000-0003-2188-1452"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Philip Branch","raw_affiliation_strings":["Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Centre for Advanced Internet Architectures (CAIA), Swinburne University of Technology, Melbourne, Australia#TAB#","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063641658"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":1.8598,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.8706191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"458","last_page":"470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8111467361450195},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.7621358036994934},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7099549770355225},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7064802646636963},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5553681254386902},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.5532101988792419},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4011179208755493},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13835623860359192}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8111467361450195},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.7621358036994934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7099549770355225},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7064802646636963},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5553681254386902},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.5532101988792419},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4011179208755493},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13835623860359192},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-642-20757-0_36","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-20757-0_36","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:researchrepository.murdoch.edu.au:34939","is_oa":false,"landing_page_url":"http://researchrepository.murdoch.edu.au/id/eprint/34939/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400274","display_name":"Murdoch Research Repository (Murdoch University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I176790772","host_organization_name":"Murdoch University","host_organization_lineage":["https://openalex.org/I176790772"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"  Zander, S. &lt;http://researchrepository.murdoch.edu.au/view/author/Zander, Sebastian.html&gt;, Armitage, G. and Branch, P.   (2011)  Stealthier Inter-packet timing covert channels.   Lecture Notes in Computer Science, 6640 .   pp. 458-470.  ","raw_type":"Journal Article"},{"id":"pmh:oai:HAL:hal-01583422v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01583422","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.458-470, &#x27E8;10.1007/978-3-642-20757-0_36&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:researchbank.swinburne.edu.au:5da2df2c-922d-495c-a5df-2d0896df20db/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/194241","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecture Notes in Computer Science: 10th International IFIP TC 6 Networking Conference (NETWORKING 2011), Valencia, Spain, 09-13 May 2011 / Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont and Caterina Scoglio (eds.), Vol. 6640, pp. 458-470","raw_type":""}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01583422v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01583422","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP Networking Conference (NETWORKING), May 2011, Valencia, Spain. pp.458-470, &#x27E8;10.1007/978-3-642-20757-0_36&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W9827866","https://openalex.org/W201917955","https://openalex.org/W1495134838","https://openalex.org/W1554138886","https://openalex.org/W1570448133","https://openalex.org/W1573224992","https://openalex.org/W1638185811","https://openalex.org/W1817407785","https://openalex.org/W1993704367","https://openalex.org/W2045234005","https://openalex.org/W2073089243","https://openalex.org/W2099111195","https://openalex.org/W2108699252","https://openalex.org/W2144312996","https://openalex.org/W2150092124","https://openalex.org/W2152112690","https://openalex.org/W2157970202","https://openalex.org/W2164413344","https://openalex.org/W2732635930","https://openalex.org/W2966207845","https://openalex.org/W6636452427"],"related_works":["https://openalex.org/W2121182846","https://openalex.org/W2315668284","https://openalex.org/W2155789024","https://openalex.org/W2109491806","https://openalex.org/W3213608175","https://openalex.org/W2058044441","https://openalex.org/W3117675750","https://openalex.org/W4321068651","https://openalex.org/W2141743053","https://openalex.org/W2343144621"],"abstract_inverted_index":{"Covert":[0],"channels":[1,12,29,55,82],"aim":[2],"to":[3,75],"hide":[4],"the":[5,44],"existence":[6],"of":[7,22,25,54,63,79,90],"communication.":[8],"Recently":[9],"proposed":[10],"packet-timing":[11],"encode":[13],"covert":[14],"data":[15],"in":[16],"inter-packet":[17,23,34],"times,":[18],"based":[19],"on":[20,117],"models":[21],"times":[24,35],"normal":[26,33],"traffic.":[27,106],"These":[28],"are":[30,36,56,83],"detectable":[31],"if":[32],"not":[37],"independent":[38],"identically-distributed,":[39],"which":[40],"we":[41],"demonstrate":[42],"is":[43,72],"case":[45],"for":[46,98],"several":[47],"network":[48,121],"applications.":[49],"We":[50,65],"show":[51],"that":[52,71],"~80%":[53],"detected":[57,84],"with":[58,102],"a":[59,86],"false":[60,87],"positive":[61,88],"rate":[62,89],"0.5%.":[64,91],"then":[66],"propose":[67],"an":[68],"improved":[69],"channel":[70,94,108],"much":[73],"harder":[74],"detect.":[76],"Only":[77],"~9%":[78],"our":[80],"new":[81,93],"at":[85],"Our":[92],"uses":[95],"packet":[96],"content":[97],"synchronisation":[99],"and":[100,104,120],"works":[101],"UDP":[103],"TCP":[105],"The":[107],"capacity":[109],"reaches":[110],"over":[111],"hundred":[112],"bits":[113],"per":[114],"second":[115],"depending":[116],"overt":[118],"traffic":[119],"jitter.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
