{"id":"https://openalex.org/W3004918327","doi":"https://doi.org/10.1109/hpcs48598.2019.9188115","title":"Detecting Selected Network Covert Channels Using Machine Learning","display_name":"Detecting Selected Network Covert Channels Using Machine Learning","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W3004918327","doi":"https://doi.org/10.1109/hpcs48598.2019.9188115","mag":"3004918327"},"language":"en","primary_location":{"id":"doi:10.1109/hpcs48598.2019.9188115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs48598.2019.9188115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112853194","display_name":"Mehdi Chourib","orcid":null},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Mehdi Chourib","raw_affiliation_strings":["Faculty of Mathematics and Computer Science, FernUniversit\u00e4t in Hagen, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Computer Science, FernUniversit\u00e4t in Hagen, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5112853194"],"corresponding_institution_ids":["https://openalex.org/I120691247"],"apc_list":null,"apc_paid":null,"fwci":1.07532422,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.82920068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"582","last_page":"588"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.8804589509963989},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.8578969836235046},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7392823696136475},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5809685587882996},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5653221607208252},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5217207670211792},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5180792808532715},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4610506594181061},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41384124755859375},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4062386751174927},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35709691047668457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2209218442440033},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2005365788936615},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06518951058387756}],"concepts":[{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.8804589509963989},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.8578969836235046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7392823696136475},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5809685587882996},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5653221607208252},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5217207670211792},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5180792808532715},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4610506594181061},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41384124755859375},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4062386751174927},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35709691047668457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2209218442440033},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2005365788936615},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06518951058387756},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcs48598.2019.9188115","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs48598.2019.9188115","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W6091113","https://openalex.org/W9657784","https://openalex.org/W433644524","https://openalex.org/W1483650506","https://openalex.org/W1535668279","https://openalex.org/W1539150806","https://openalex.org/W1549998098","https://openalex.org/W1558514591","https://openalex.org/W1573528873","https://openalex.org/W1586882435","https://openalex.org/W1827189246","https://openalex.org/W1896822992","https://openalex.org/W1901616594","https://openalex.org/W1966809779","https://openalex.org/W1981844530","https://openalex.org/W1987281309","https://openalex.org/W1988148591","https://openalex.org/W1993704367","https://openalex.org/W2017380649","https://openalex.org/W2020317832","https://openalex.org/W2030553727","https://openalex.org/W2036068512","https://openalex.org/W2060626729","https://openalex.org/W2060949882","https://openalex.org/W2063735333","https://openalex.org/W2063862666","https://openalex.org/W2076361235","https://openalex.org/W2078755394","https://openalex.org/W2099137371","https://openalex.org/W2101109743","https://openalex.org/W2104002845","https://openalex.org/W2105250379","https://openalex.org/W2120467192","https://openalex.org/W2130676130","https://openalex.org/W2131588610","https://openalex.org/W2132870739","https://openalex.org/W2147169507","https://openalex.org/W2147996137","https://openalex.org/W2157428729","https://openalex.org/W2157852252","https://openalex.org/W2163922914","https://openalex.org/W2165391761","https://openalex.org/W2166180744","https://openalex.org/W2168020168","https://openalex.org/W2170899024","https://openalex.org/W2199864171","https://openalex.org/W2213952365","https://openalex.org/W2278186031","https://openalex.org/W2399411376","https://openalex.org/W2534316961","https://openalex.org/W2765776360","https://openalex.org/W2906313612","https://openalex.org/W2964138484","https://openalex.org/W3103836116","https://openalex.org/W4211095904","https://openalex.org/W4239510810","https://openalex.org/W4244238212","https://openalex.org/W4250658309","https://openalex.org/W6600247753","https://openalex.org/W6632180709","https://openalex.org/W6632378163","https://openalex.org/W6638644045","https://openalex.org/W6688428952","https://openalex.org/W6728579745","https://openalex.org/W6745456659"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W1568579691","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W1587013156","https://openalex.org/W4386075149","https://openalex.org/W4239080508","https://openalex.org/W2326198059","https://openalex.org/W4319780484"],"abstract_inverted_index":{"Network":[0],"covert":[1,29,46,55,71,79,93,98,162],"channels":[2,30,56,80,99],"break":[3],"a":[4,10,15,38,160,166],"computer's":[5],"security":[6],"policy":[7],"to":[8,67,115,126],"establish":[9],"stealthy":[11],"communication.":[12],"They":[13],"are":[14,51,65,100,135],"threat":[16],"being":[17],"increasingly":[18],"used":[19,114,125],"by":[20],"malicious":[21],"software.":[22],"Most":[23],"previous":[24],"studies":[25],"on":[26],"detecting":[27,76],"network":[28,70],"using":[31,43],"Machine":[32],"Learning":[33],"(ML)":[34],"were":[35],"tested":[36,132],"with":[37,81,165],"dataset":[39,87,112],"that":[40],"was":[41,88],"created":[42,89],"one":[44],"single":[45],"channel":[47,94,163],"tool":[48],"and":[49,77,96,106,143,164],"also":[50],"ineffective":[52],"at":[53,156],"classifying":[54,78],"into":[57,104],"patterns.":[58],"In":[59],"this":[60],"paper,":[61],"selected":[62],"ML":[63,119,133],"methods":[64],"applied":[66],"detect":[68],"popular":[69],"channels.":[72],"The":[73,121,131,148],"capacity":[74],"of":[75,109,159,171],"high":[82],"precision":[83,154],"is":[84,113,124],"demonstrated.":[85],"A":[86],"from":[90],"nine":[91],"standard":[92],"tools":[95],"the":[97,110,128,152],"then":[101],"accordingly":[102],"classified":[103],"patterns":[105],"labelled.":[107],"Half":[108],"generated":[111],"train":[116],"three":[117],"different":[118],"algorithms.":[120],"remaining":[122],"half":[123],"verify":[127],"algorithms'":[129],"performance.":[130],"algorithms":[134],"Support":[136],"Vector":[137],"Machines":[138],"(SVM),":[139],"k-Nearest":[140],"Neighbors":[141],"(k-NN)":[142],"Deep":[144],"Neural":[145],"Networks":[146],"(DNN).":[147],"k-NN":[149],"model":[150],"demonstrated":[151],"highest":[153],"rate":[155,170],"98%":[157],"detection":[158],"given":[161],"low":[167],"false":[168],"positive":[169],"1%.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
