{"id":"https://openalex.org/W3116036149","doi":"https://doi.org/10.1109/access.2020.3046234","title":"SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning","display_name":"SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W3116036149","doi":"https://doi.org/10.1109/access.2020.3046234","mag":"3116036149"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3046234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3046234","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09301285.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09301285.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018183651","display_name":"Shorouq Al-Eidi","orcid":"https://orcid.org/0000-0002-4090-3736"},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shorouq Al-Eidi","raw_affiliation_strings":["Memorial University of Newfoundland, St. John\u2019s, NL, Canada","Memorial University of Newfoundland, St. John's, NL, Canada"],"affiliations":[{"raw_affiliation_string":"Memorial University of Newfoundland, St. John\u2019s, NL, Canada","institution_ids":["https://openalex.org/I130438778"]},{"raw_affiliation_string":"Memorial University of Newfoundland, St. John's, NL, Canada","institution_ids":["https://openalex.org/I130438778"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091723521","display_name":"Omar Darwish","orcid":"https://orcid.org/0000-0001-8346-7148"},"institutions":[{"id":"https://openalex.org/I152372855","display_name":"Ferrum College","ror":"https://ror.org/0128ckf82","country_code":"US","type":"education","lineage":["https://openalex.org/I152372855"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Omar Darwish","raw_affiliation_strings":["Ferrum College, Ferrum, VA, USA"],"affiliations":[{"raw_affiliation_string":"Ferrum College, Ferrum, VA, USA","institution_ids":["https://openalex.org/I152372855"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067333778","display_name":"Yuanzhu Chen","orcid":"https://orcid.org/0000-0002-6998-6408"},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yuanzhu Chen","raw_affiliation_strings":["Memorial University of Newfoundland, St. John\u2019s, NL, Canada","Memorial University of Newfoundland, St. John's, NL, Canada"],"affiliations":[{"raw_affiliation_string":"Memorial University of Newfoundland, St. John\u2019s, NL, Canada","institution_ids":["https://openalex.org/I130438778"]},{"raw_affiliation_string":"Memorial University of Newfoundland, St. John's, NL, Canada","institution_ids":["https://openalex.org/I130438778"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085120545","display_name":"Ghaith Husari","orcid":null},"institutions":[{"id":"https://openalex.org/I119443389","display_name":"East Tennessee State University","ror":"https://ror.org/05rfqv493","country_code":"US","type":"education","lineage":["https://openalex.org/I119443389"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ghaith Husari","raw_affiliation_strings":["East Tennessee State University, Johnson City, TN, USA"],"affiliations":[{"raw_affiliation_string":"East Tennessee State University, Johnson City, TN, USA","institution_ids":["https://openalex.org/I119443389"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018183651"],"corresponding_institution_ids":["https://openalex.org/I130438778"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.0295,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.89799526,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"177","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8328697681427002},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6458439826965332},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.44678768515586853},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44491448998451233},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41978126764297485},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07598063349723816}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8328697681427002},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6458439826965332},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.44678768515586853},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44491448998451233},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41978126764297485},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07598063349723816},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3046234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3046234","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09301285.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:dc.etsu.edu:etsu-works-11032","is_oa":true,"landing_page_url":"https://dc.etsu.edu/etsu-works/9766","pdf_url":null,"source":{"id":"https://openalex.org/S4377196424","display_name":"Digital Commons - East Tennessee State University (East Tennessee State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I119443389","host_organization_name":"East Tennessee State University","host_organization_lineage":["https://openalex.org/I119443389"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ETSU Faculty Works","raw_type":"text"},{"id":"pmh:oai:doaj.org/article:3f01e17dff91438c9a795bccc403f0d2","is_oa":true,"landing_page_url":"https://doaj.org/article/3f01e17dff91438c9a795bccc403f0d2","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 177-191 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3046234","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3046234","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09301285.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3116036149.pdf","grobid_xml":"https://content.openalex.org/works/W3116036149.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1471507","https://openalex.org/W759577938","https://openalex.org/W1495134838","https://openalex.org/W1558514591","https://openalex.org/W1588277031","https://openalex.org/W1654127184","https://openalex.org/W1958789226","https://openalex.org/W1997704547","https://openalex.org/W2010065958","https://openalex.org/W2011301426","https://openalex.org/W2040034272","https://openalex.org/W2056127986","https://openalex.org/W2060949882","https://openalex.org/W2062176568","https://openalex.org/W2070970642","https://openalex.org/W2074155084","https://openalex.org/W2103662262","https://openalex.org/W2116807588","https://openalex.org/W2124929753","https://openalex.org/W2127264212","https://openalex.org/W2132177566","https://openalex.org/W2133990480","https://openalex.org/W2151185692","https://openalex.org/W2154608275","https://openalex.org/W2157970202","https://openalex.org/W2164766691","https://openalex.org/W2220012807","https://openalex.org/W2329612710","https://openalex.org/W2370146518","https://openalex.org/W2425931228","https://openalex.org/W2504555618","https://openalex.org/W2578671395","https://openalex.org/W2579495707","https://openalex.org/W2587530497","https://openalex.org/W2595350342","https://openalex.org/W2704360550","https://openalex.org/W2738114525","https://openalex.org/W2745274551","https://openalex.org/W2746180280","https://openalex.org/W2783615536","https://openalex.org/W2796394805","https://openalex.org/W2889085820","https://openalex.org/W2897333945","https://openalex.org/W2951498981","https://openalex.org/W3018073244","https://openalex.org/W6622293926","https://openalex.org/W6682570985","https://openalex.org/W6683932219","https://openalex.org/W6708271021","https://openalex.org/W7002367823"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W789579324","https://openalex.org/W1587013156","https://openalex.org/W4239080508","https://openalex.org/W4386075149","https://openalex.org/W2326198059","https://openalex.org/W165152124"],"abstract_inverted_index":{"With":[0],"the":[1,44,66,72,81,104,107,113,137,140,164,177,186,189,196,273],"rapid":[2],"growth":[3],"of":[4,34,74,84,106,109,169,188,191,236,251,261],"data":[5,42,234],"exfiltration":[6],"carried":[7],"out":[8],"by":[9,112,194],"cyber":[10,75],"attacks,":[11],"Covert":[12],"Timing":[13],"Channels":[14],"(CTC)":[15],"have":[16],"become":[17],"an":[18,121],"imminent":[19],"network":[20],"security":[21],"risk":[22],"that":[23,139,145],"continues":[24],"to":[25,39,59,77,90,97,149,159],"grow":[26],"in":[27,92,200],"both":[28,93],"sophistication":[29],"and":[30,80,95,99,102,130,162,214,238,256],"utilization.":[31],"These":[32],"types":[33],"channels":[35,87,142,203],"utilize":[36,56],"inter-arrival":[37],"times":[38],"steal":[40],"sensitive":[41],"from":[43,65],"targeted":[45],"networks.":[46],"CTC":[47,128],"detection":[48,79,88,114,129,221,249],"relies":[49],"increasingly":[50],"on":[51,136,231],"machine":[52],"learning":[53],"techniques,":[54],"which":[55,201,268],"statistical-based":[57,275],"metrics":[58],"separate":[60],"malicious":[61,165],"(covert)":[62],"traffic":[63,144,173,181,198,209,259],"flows":[64,199,210],"legitimate":[67],"(overt)":[68],"ones.":[69],"However,":[70],"given":[71],"efforts":[73],"attacks":[76],"evade":[78],"growing":[82],"column":[83],"CTC,":[85],"covert":[86,141,178,202,222,237,258,266],"needs":[89],"improve":[91],"performance":[94,246],"precision":[96],"detect":[98,161],"prevent":[100],"CTCs":[101,255],"mitigate":[103],"reduction":[105],"quality":[108,190],"service":[110,192],"caused":[111,193],"process.":[115],"In":[116],"this":[117,153],"article,":[118],"we":[119,216],"present":[120],"innovative":[122],"image-based":[123,218],"solution":[124,156],"for":[125,220,253,263],"fully":[126],"automated":[127],"localization.":[131],"Our":[132],"approach":[133,184,242],"is":[134,157,269],"based":[135],"observation":[138],"generate":[143],"can":[146,277],"be":[147],"converted":[148],"colored":[150,212],"images.":[151],"Leveraging":[152],"observation,":[154],"our":[155,183],"designed":[158],"automatically":[160],"locate":[163],"part":[166],"(i.e.,":[167],"set":[168,235],"packets)":[170],"within":[171,180],"a":[172,226,232,244,248,257],"flow.":[174],"By":[175],"locating":[176],"parts":[179],"flows,":[182],"reduces":[185],"drop":[187],"blocking":[195],"entire":[197],"are":[204],"detected.":[205],"We":[206,224],"first":[207],"convert":[208],"into":[211],"images,":[213],"then":[215],"extract":[217],"features":[219,230],"traffic.":[223,240],"train":[225],"classifier":[227],"using":[228],"these":[229],"large":[233],"overt":[239],"This":[241],"demonstrates":[243],"remarkable":[245],"achieving":[247],"accuracy":[250,260],"95.83%":[252],"cautious":[254],"97.83%":[262],"8":[264],"bit":[265],"messages,":[267],"way":[270],"beyond":[271],"what":[272],"popular":[274],"solutions":[276],"achieve.":[278]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
