• DocumentCode
    3705286
  • Title

    A novel method for securing critical infrastructures by detecting hidden flows of data

  • Author

    F. Benedetto;G. Giunta;A. Liguori;A. Wacker

  • Author_Institution
    Signal Processing for Telecommun. and Economics Lab., University of ?ROMA TRE?, Rome, Italy
  • fYear
    2015
  • Firstpage
    648
  • Lastpage
    654
  • Abstract
    This work introduces a novel method for securing critical infrastructures. We propose an innovative hypothesis test for intrusion detection in data communications. In particular, we detect the presence or absence of a covert (i.e. hidden) timing channel. We devised a new testing procedure, namely the Weibullness test, that statistically measures how much the series under investigation (inter-arrival times of the received packets) fits Weibull vs. non-Weibull models. This is equivalent to differentiating between the cases of legitimate and covert data communications. The achieved results show the robustness of this innovative test versus the conventional shape and regularity tests, even in presence of short-lived covert communications for intrusion detection in data communications.
  • Keywords
    "Testing","Timing","Shape","Weibull distribution","Data communication","Yttrium","Conferences"
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2015 IEEE Conference on
  • Type

    conf

  • DOI
    10.1109/CNS.2015.7346881
  • Filename
    7346881