{"id":"https://openalex.org/W2546483130","doi":"https://doi.org/10.1109/wifs.2010.5711441","title":"A phase-space reconstruction approach to detect covert channels in TCP/IP protocols","display_name":"A phase-space reconstruction approach to detect covert channels in TCP/IP protocols","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2546483130","doi":"https://doi.org/10.1109/wifs.2010.5711441","mag":"2546483130"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2010.5711441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711441","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101793098","display_name":"Hong Zhao","orcid":"https://orcid.org/0000-0003-3207-6766"},"institutions":[{"id":"https://openalex.org/I32907511","display_name":"Fairleigh Dickinson University","ror":"https://ror.org/04wkzvc75","country_code":"US","type":"education","lineage":["https://openalex.org/I32907511"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hong Zhao","raw_affiliation_strings":["School of Computer Sciences and Engineering, Fairleigh Dickinson University, Teaneck, NJ, USA","School of Computer Sciences and Engineering, Fairleigh Dickinson University, 1000 River Rd. Teaneck, NJ 07670, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences and Engineering, Fairleigh Dickinson University, Teaneck, NJ, USA","institution_ids":["https://openalex.org/I32907511"]},{"raw_affiliation_string":"School of Computer Sciences and Engineering, Fairleigh Dickinson University, 1000 River Rd. Teaneck, NJ 07670, USA","institution_ids":["https://openalex.org/I32907511"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112253415","display_name":"Yun Q. Shi","orcid":"https://orcid.org/0009-0007-4038-0430"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yun Q. Shi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA","Department of Electrical and Computer Engineering, New Jersey Institute of Technology, 323 M. L. King Blvd., Newark, NJ 07102, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, New Jersey Institute of Technology, 323 M. L. King Blvd., Newark, NJ 07102, USA","institution_ids":["https://openalex.org/I118118575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101793098"],"corresponding_institution_ids":["https://openalex.org/I32907511"],"apc_list":null,"apc_paid":null,"fwci":1.3531,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.85795142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7768486738204956},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.7126842737197876},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.534648597240448},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4843360185623169},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4600406289100647},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.43964725732803345},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3984745740890503},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36203962564468384},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3384898006916046},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1090385913848877}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7768486738204956},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.7126842737197876},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.534648597240448},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4843360185623169},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4600406289100647},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.43964725732803345},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3984745740890503},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36203962564468384},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3384898006916046},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1090385913848877},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wifs.2010.5711441","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711441","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W25952552","https://openalex.org/W1984391316","https://openalex.org/W1993704367","https://openalex.org/W2060626729","https://openalex.org/W2098313089","https://openalex.org/W2120467192","https://openalex.org/W2144379926","https://openalex.org/W2170074829","https://openalex.org/W4285719527","https://openalex.org/W6678081568"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W1568579691","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W1587013156","https://openalex.org/W4239080508","https://openalex.org/W2326198059","https://openalex.org/W4319780484","https://openalex.org/W165152124"],"abstract_inverted_index":{"Covert":[0],"channels":[1,46],"via":[2],"the":[3,27,42,73,80],"widely":[4],"used":[5,121],"TCP/IP":[6],"protocols":[7],"have":[8,89],"become":[9],"a":[10],"new":[11,117],"challenge":[12],"issue":[13],"for":[14,122],"network":[15],"security.":[16],"In":[17],"this":[18,70],"paper,":[19],"we":[20],"propose":[21],"an":[22],"effective":[23],"method":[24,51,95],"to":[25,47,56,78],"detect":[26],"existence":[28,81],"of":[29,60,82,100,110],"hidden":[30,84],"information":[31,83],"in":[32,85,98],"TCP":[33],"ISNs":[34],"(Initial":[35],"Sequence":[36],"Numbers),":[37],"which":[38],"are":[39],"known":[40],"as":[41,113],"most":[43],"difficult":[44],"covert":[45],"be":[48,120],"detected.":[49],"Our":[50],"uses":[52],"phase":[53],"space":[54],"reconstruction":[55],"characterize":[57],"dynamic":[58],"nature":[59],"ISNs.":[61,86],"A":[62],"statistical":[63],"model":[64],"is":[65,76],"then":[66],"proposed.":[67],"Based":[68],"on":[69],"proposed":[71,93],"model,":[72],"classification":[74],"algorithm":[75],"developed":[77],"identify":[79],"Simulation":[87],"results":[88],"demonstrated":[90],"that":[91],"our":[92,116],"detection":[94],"outperforms":[96],"the-state-of-the-art":[97,114],"terms":[99],"high":[101],"detecting":[102],"accuracy":[103],"and":[104],"greatly":[105],"reduced":[106],"computational":[107],"complexity.":[108],"Instead":[109],"off-line":[111],"processing":[112],"does,":[115],"scheme":[118],"can":[119],"on-line":[123],"detection.":[124]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
