<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Massimo</forename><surname>Guarascio</surname></persName>
							<email>massimo.guarascio@icar.cnr.it</email>
							<affiliation key="aff0">
								<orgName type="department">ICAR -Institute for High Performance Computing and Networking</orgName>
								<address>
									<addrLine>Via Pietro Bucci, cubo 8/9C -87036</addrLine>
									<settlement>Rende</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marco</forename><surname>Zuppelli</surname></persName>
							<email>marco.zuppelli@ge.imati.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="department">IMATI -Institute for Applied Mathematics and Information Technologies</orgName>
								<address>
									<addrLine>Via de Marini, 6 -16149</addrLine>
									<settlement>Genova</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nunziato</forename><surname>Cassavia</surname></persName>
							<email>nunziato.cassavia@icar.cnr.it</email>
							<affiliation key="aff0">
								<orgName type="department">ICAR -Institute for High Performance Computing and Networking</orgName>
								<address>
									<addrLine>Via Pietro Bucci, cubo 8/9C -87036</addrLine>
									<settlement>Rende</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giuseppe</forename><surname>Manco</surname></persName>
							<email>giuseppe.manco@icar.cnr.it</email>
							<affiliation key="aff0">
								<orgName type="department">ICAR -Institute for High Performance Computing and Networking</orgName>
								<address>
									<addrLine>Via Pietro Bucci, cubo 8/9C -87036</addrLine>
									<settlement>Rende</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luca</forename><surname>Caviglione</surname></persName>
							<email>luca.caviglione@ge.imati.cnr.it</email>
							<affiliation key="aff1">
								<orgName type="department">IMATI -Institute for Applied Mathematics and Information Technologies</orgName>
								<address>
									<addrLine>Via de Marini, 6 -16149</addrLine>
									<settlement>Genova</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">8998333AADC890619C7E755102DE2CF9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T15:50+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Covert Channel, Autoencoder, IoT Security L. Caviglione) 0000-0001-7711-9833 (M. Guarascio)</term>
					<term>0000-0001-6932-3199 (M. Zuppelli)</term>
					<term>0000-0001-9991-5021 (N. Cassavia)</term>
					<term>0000-0001-9672-3833 (G. Manco)</term>
					<term>0000-0001-6466-3354 (L. Caviglione)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Steganographic techniques and covert channels are becoming exploited by a wide-range of malware to avoid detection and bypass network security tools. With the ubiquitous diffusion of IoT nodes, such offensive schemes are expected to be used to exfiltrate data or to covertly orchestrate botnets composed of resource-constrained nodes (e.g., as it happens in Mirai). Therefore, in this paper, we present a machine learning technique for the detection of network covert channels targeting the TTL field of IPv4 datagrams. Specifically, we propose to use Autoencoders to reveal anomalous traffic behaviors. The experimental evaluation performed over realistic traffic traces showcases the effectiveness of our approach.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The Internet of Things (IoT) paradigm allows to create advanced services able to interact with the physical world and to remotely operate large-scale infrastructures. As a result, the number of applications taking advantage of IoT technologies is now almost unbounded. For instance, cost-effective sensors and devices are used for entertainment and health purposes, to access and manage industrial control systems, as well as to automatize homes and buildings. Unfortunately, the tight coupling between devices and physical entities, the resource-constrained nature of many nodes, and the lack of rigorous development or configuration processes, are at the basis of countless security and privacy flaws <ref type="bibr" target="#b0">[1]</ref>.</p><p>Despite IoT nodes are often considered simple devices, they can be used to implement effective threats. As an example, the Mirai malware allows to create a large-scale botnet of devices with limited computing and connectivity resources, which has been used to launch Distributed Denial of Service (DDoS) attacks against many international organizations and sensitive targets <ref type="bibr" target="#b1">[2]</ref>.</p><p>In addition, IoT nodes can be enumerated to infer details on the physical deployment <ref type="bibr" target="#b2">[3]</ref> and their traffic can be inspected to implement various side-channel-based techniques or to conduct reconnaissance campaigns <ref type="bibr" target="#b3">[4]</ref>. Therefore, a major effort is devoted to make IoT ecosystems more secure, but this could be partially voided by the recent trend of developing malware able to remain undetected and bypass classical network security mechanisms. This new class of threats takes advantage of various information hiding and steganographic techniques to conceal malicious payloads in innocent-looking software assets, retrieve additional configuration files without being noticed, or covertly exfiltrate hidden information <ref type="bibr" target="#b4">[5]</ref>. Among the various attack mechanisms, the adoption of network covert channels, i.e., cloaked and parasitic communication paths nested within legitimate traffic flows, is gaining momentum. Specifically, network covert channels can be exploited to establish Command &amp; Control (C&amp;C) communications, as well as to bypass intrusion detection/prevention systems and firewalls for stealthily exchange vast volumes of personal data <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b3">4]</ref>. A recent example of attack using a network covert channel is Sunburst, which hides commands in HTTP traffic <ref type="foot" target="#foot_0">1</ref> . Due to the ubiquitous availability of devices always connected to the Internet, their intrinsic interaction with sensitive data, as well as several design flaws and limitations, completely assessing the security of IoT deployments requires also to consider threats endowed with network covert channels capabilities. To develop suitable mitigation techniques, machine learning approaches demonstrated to be effective for detecting a multitude of network attacks and to implement general intrusion detection mechanisms <ref type="bibr" target="#b5">[6]</ref>. Unfortunately, countermeasures against network covert channels are poorly-generalizable, since each hiding mechanism and network protocol have specific traits and behaviors <ref type="bibr" target="#b6">[7]</ref>. For instance, using some form of AI to reveal a channel hidden within DNS traffic <ref type="bibr" target="#b7">[8]</ref> requires a complete different inspection mechanism and metrics compared to the case of parasitic communications targeting IPv6 conversations <ref type="bibr" target="#b8">[9]</ref>. As a result, the literature abounds of attack-specific detection methodologies and working towards a unique framework is still an open research problem (see, e.g., <ref type="bibr" target="#b9">[10]</ref> for a recent survey on the topic). A different case concerns the detection of timing channels, which are created by encoding information in temporal statistics of network traffic. To this aim, the secret information is usually hidden within the inter-packet time or in the throughput characterizing a specific stream or network conversation <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b6">7]</ref>. Owing to the protocol-agnostic trait of timing protocols, several works using machine learning have been proposed <ref type="bibr" target="#b10">[11]</ref> even by exploiting techniques originally introduced for image processing <ref type="bibr" target="#b11">[12]</ref>.</p><p>Therefore, in this work we address the problem of detecting network covert channels targeting the TTL field of IPv4 datagrams. In fact, the resource-constrained nature of IoT devices, including the use of "lean" TCP/IP protocol stacks to tame complexity, prevent malware to implement sophisticated covert channels or computing-intensive network steganography algorithms. To develop our detection methods, we take advantage of autoencoders, which are neural networks where the target of the network is the data itself. Autoencoders allow to reduce dimensionality and to learn efficient encoding, whereas they are a convenient choice when in absence of a labeled dataset. This is of prime importance when addressing malware exploiting network covert channels, since it often remains undetected or undocumented until major reverse engineering or forensics investigations <ref type="bibr" target="#b12">[13]</ref>. As regards prior works considering covert channels targeting  IoT scenarios, the literature mainly focuses on timing channels, for instance to detect cloaked communications in SCADA applications <ref type="bibr" target="#b13">[14]</ref> or in the Constrained Application Protocol <ref type="bibr" target="#b14">[15]</ref>.</p><p>Summing up, the contributions of this work are: the design of a machine-learning-capable approach for detecting covert channels targeting IoT ecosystems, and a performance evaluation campaign based on realistic traffic traces commonly used in the literature. Since countermeasures could be also deployed at the border of the network in nodes with limited capabilities (e.g., home gateways) emphasis has been put on the footprint required by the proposed approach.</p><p>The remainder of the paper is structured as follows. Section 2 provides details on the considered attack model, Section 3 introduces our approach to detect covert channels targeting the TTL of IPv4 datagrams, and Section 4 showcases numerical results. Finally, Section 5 concludes the paper and outlines possible future research directions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Attack Model and Design of the Covert Channel</head><p>This section discusses the attack model taking advantage of a network covert channel. Figure <ref type="figure" target="#fig_1">1</ref> showcases the general reference scenario. Specifically, we consider an attacker able to take control of one or more IoT nodes, for instance by dropping a malicious payload via a phishing campaign <ref type="bibr" target="#b0">[1]</ref>. The infected device will then create a network covert channel to exfiltrate data towards a remote C&amp;C server or to exchange commands with the attacker, e.g., to configure a backdoor or operate a botnet. Relying upon a network covert channel allows to bypass a firewall or specific security policies enforced by a middlebox, such as a home gateway.</p><p>Even if the literature abounds of techniques for creating cloaked communication paths within network flows and real-world threats taking advantage of information hiding are multiplying <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b15">16]</ref>, the resource-limited nature of IoT nodes poses constraints on the complexity of the covert channel. As a consequence, the embedding mechanism should be simple in order to not disclose the presence of the malware due to perceptible lags or anomalous depletion of batteries. At the same time, since IoT traffic often requires some form of Quality of Experience (e.g., to not postpone the execution of commands sent by the user), traffic alterations and the introduction of additional delays should be limited. Therefore, we consider a malware cloaking data within the TTL field of the IPv4 header <ref type="bibr" target="#b6">[7]</ref>. In more detail, the TTL is manipulated to implement a storage network covert channel and transport arbitrary information. Due to the varying nature of the TTL and to not appear suspicious, the malware should not directly write the secret data in the field <ref type="bibr" target="#b16">[17]</ref>. Rather, it can encode the bits 1 and 0 by increasing or decreasing the observed TTL of a suitable threshold or by using most common values as "high" and "low" signals. Finding proper TTL values is not trivial, since their difference should be ample enough to absorb fluctuations caused by alterations of the routing and to prevent decoding errors, while not reducing the stealthiness of the channel. To design the covert channel, the attacker usually investigates the targeted network to understand "clean" traffic conditions and adapt the hiding mechanism. To tune the channel, we considered the collection of IoT traffic made available in <ref type="bibr" target="#b2">[3]</ref>. As an example, we showcase results for the 24-hour slice of data captured from September 22, 2016 at 16:00 to September 23, 2016 at 16:00, CEST <ref type="foot" target="#foot_2">2</ref> . Without loss of generality and to prevent burdening results, we removed IPv6, ICMP, DNS and NTP conversations, in addition to multicast/broadcast traffic. Figure <ref type="figure">2</ref> depicts heatmaps for the collected TTL values. As depicted in Figure <ref type="figure">2a</ref>, the values observed for the TTL are clusterized, especially in the 32 − 64 and 208 − 224 ranges. This requires the attacker to encode information without using values never observed in normal conditions. Yet, traffic conditions are not static, hence, we refined our analysis by resetting the observed values each hour. Figure <ref type="figure">2b</ref> portraits results. As shown, some values of the TTL are always present in the traffic (e.g., those around 48), whereas others have an intermittent behavior. For instance, datagrams with a TTL equal to 128 are present only for 3 hours (i.e., from 13-th to the 16-th hours). This puts constraints on the temporal location of channels using a TTL equal to 128 as well as on their duration.</p><p>In general, channels targeting the TTL should alter datagrams in a limited manner in order to avoid macroscopic per-flow signatures <ref type="bibr" target="#b16">[17]</ref>. Moreover, TTL values highly depend on the type of nodes, hosts and appliances exchanging traffic through the network. In fact, Android and iOS devices as well as Linux hosts generate traffic with a default TTL of 64, whereas Windows nodes use a default TTL of 128 <ref type="bibr" target="#b17">[18]</ref>. Thus another important trade off should aim at avoiding to make the channel detectable via simple host/OS fingerprinting mechanism</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Detecting Covert Channels With Autoencoders</head><p>This section describes the deep learning-based approach adopted to identify the presence of covert channels within traffic flows. In our scenario, the detector takes the form of an unsupervised deep neural network. The main benefit of our approach is the possibility of the model to raise alarms also on never seen attacks: this is a frequent case when dealing with covert channels, since they are often undocumented and unknown a priori. Moreover, this solution allows for coping with the lack of labeled data issue, typical of our application scenario. Specifically, our solution allows for learning a neural encoder-decoder network aiming at compressing the input data (represented by metrics computed over the traffic generated by the IoT network) within a latent space, which is then used to reconstruct the original information. Here, the main idea is that the legitimate input data should be slightly affected by the encoding/decoding procedures performed by the model, therefore the original distributions   substantially remain unchanged after this process. By contrast, anomalous instances will exhibit deviant values that can lead to failures in the input reconstruction.</p><p>Although the idea to use the reconstruction error as an anomaly score to identify deviant behaviors is not new itself, the adoption of unsupervised techniques (and in particular of autoencoder-based solutions) for detecting covert channels is quite unexplored <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b9">10]</ref>. Hence, the use of autoencoders <ref type="bibr" target="#b18">[19,</ref><ref type="bibr" target="#b19">20]</ref> represents an effective approach to the unsupervised task of learning a compressed representation able to effectively summarize the main information contained in the input data. In essence, it can be thought as a neural network whose aim consists in yielding as output a duplicate (as close as possible) similar to the input data.</p><p>Figure <ref type="figure">3</ref> shows the considered neural architecture. As shown, the architecture is composed of two main components, named Encoder and Decoder, respectively. Let 𝑥 = {𝑥 1 , . . . , 𝑥 𝑁 } be a set of numeric features (in our scenario, a set of statistics computed on the network traffic flow yielded in a time slot). The former subnet allows for mapping z = enc(x) the input data with a latent space (encoding), whereas the second one maps the features extracted by the encoder with the output y = dec(z) (decoding). Gradient descent is used to learn the model weights by minimizing a suitable reconstruction loss. In this paper, we adopted the Mean Square Error, i.e., 𝐿𝑜𝑠𝑠 𝑀 𝑆𝐸 (𝑥) = 1</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝑁</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>∑︀</head><p>𝑖 ‖x i − y i ‖ 2 . Notably, the architecture shown in Figure <ref type="figure">3</ref> exhibits two main differences with respect to a standard encoder-decoder model: (i) Skip Connections are used to boost the predictive performances of the model and to reduce the number of iterations required for the learning algorithm convergence, and (ii) a hybrid approach including the usage of Sparse Dense Layers is adopted to make the autoencoder more robust to noise, especially since attacks often exhibit slight differences compared with normal behaviors. In more detail, the idea behind Skip Connections is to "help" the learning phase of the decoder by providing as input to each layer of the decoder both the previous and the correspondent encoder layer. As regard the use of Sparse Dense Layers, this allows for yielding a wider number of discriminative features that can be used to extract a more effective latent representation.</p><p>Figure <ref type="figure" target="#fig_5">4</ref> shows how the detection of covert channels targeting the TTL of IPv4 datagrams is performed. Without loss of generality, we assume to monitor an infinite datastream, i.e., the traffic produced by the various IoT nodes continuously feeds our detection mechanism. At pre-fixed time intervals (corresponding to a time slot in Figure <ref type="figure" target="#fig_5">4</ref>), we compute a number of statistics to describe the behavior of the TTL fields composing the aggregate traffic flow. This operation can be performed without impacting on the overall traffic and by using limited computing resources (see, e.g., the use of the extended Berkeley Packet Filter (eBPF) <ref type="bibr" target="#b8">[9]</ref>). In more detail, we compute metrics such as the min, average, max, different percentiles, etc., starting from TTL values gathered from the packets composing the inspected traffic aggregate. First, an autoencoder, pretrained only against legitimate data flows, is used to reproduce the statistics, then reconstruction error is computed for the current example as the MSE between 𝑥 and 𝑦. Finally, if the error is lesser than a given outlierness threshold, the current data are labeled as "normal" and exploited to update the model, otherwise a warning is raised.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Performance Evaluation</head><p>In this section we present the performance of the approach based on autoencoders. Preliminary, we discuss the used dataset, then we showcase numerical results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Dataset Preparation</head><p>To evaluate the effectiveness of our approach for detecting network covert channels targeting IoT ecosystems, we prepared an artificial dataset starting from the traffic traces made available in <ref type="bibr" target="#b2">[3]</ref>. In more detail, we used datasets containing traffic collected from September 22, 2016 at 16:00 to September 29, 2016 at 16:00, CEST. Similarly to the example of Section 2, we removed IPv6, ICMP, DNS and NTP conversations as well as multicast/broadcast traffic. To avoid unwanted signatures/fingerprints, we also removed traffic generated by non-IoT devices, such as mobile  phones and laptops. We then obtained a 1-week long dataset with an overall throughput in the 5 − 36 kbit/s range, generated by 28 IoT endpoints, such as speakers, lights, cameras, and hubs.</p><formula xml:id="formula_0">Data Stream packet i packet i-1 packet i-2 packet i-p ...</formula><p>To implement the considered attack template in a realistic manner, we modeled the presence of a threat tampering a single IoT device. As an example, the attacker could gain access to the assets of the victim via phishing or by exploiting some ad-hoc CVEs <ref type="foot" target="#foot_3">3</ref> . In our scenario, we considered a malicious software targeting the Dropcam camera, which has been used to send/exfiltrate sensitive data towards a remote C&amp;C facility. To have a dataset containing fair amounts of "legitimate" and cloaked conversations, we assumed that the IoT device has been tampered on September 27, thus the Dropcam has been under control of the attacker for 3 days.</p><p>To create the various storage network covert channels, we used the tool available in <ref type="bibr" target="#b20">[21]</ref>, which allows to directly rewrite the traffic captures and implement realistic attack conditions. As discussed in Section 2, to not make the detection trivial, we encoded bits 1 and 0 in TTL values equal to 64 and 100, respectively. Moreover, we randomly interleaved packets containing hidden data with legitimate/unaltered packets in order to prevent long bursts of manipulated TTL values. In fact, the latter could reduce the stealthiness of the covert channel leading to a trivial detection <ref type="bibr" target="#b16">[17]</ref>. Such a behavior can be ascribed to an attacker switching the hidden communication among two states (i.e., exfiltrate data and not manipulate traffic) to remain unnoticed via elusive mechanisms. To avoid further statistical signatures, the secret data transmitted over the covert channel has been modeled with randomly-generated strings: this represents an attacker using some obfuscation technique, e.g., encryption or scrambling <ref type="bibr" target="#b21">[22]</ref>. Concerning the volume of data transmitted within the covert channel, we modeled each day of attack with a different template. Specifically, we considered the exfiltration of 69, 80, and 64 kbit of data. Such volumes can represent sensitive information like several username+password pairs or configuration details of a specific IoT device or smart hub. Moreover, assuming covert transmissions in the 64 − 80 kbit range allowed to have an IoT node accounting for a variable amount of steganographically-modified traffic. In more detail, the compromised IoT node manipulates the 18%, 1%, and 12% of the overall daily traffic, respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Pre-processing, Parameters and Evaluation Metrics</head><p>To test our approach for revealing the presence of network covert channels within traffic aggregates, we developed a prototype in Python based on the TensorFlow<ref type="foot" target="#foot_4">4</ref> library. The traffic dataset presented in Section 4.1 has been processed to obtain the following information: a progressive timestamp, the number of incoming packets within a given time slot, the average and median values of observed TTLs, the values of the 10 𝑡ℎ , 25 𝑡ℎ , 75 𝑡ℎ and 90 𝑡ℎ percentile, minimum and maximum TTLs, as well as a label indicating the presence of the attack (i.e., for testing purposes). Recalling that our approach exploits a "slotted" architecture (see Figure <ref type="figure" target="#fig_5">4</ref>), in this work we consider a time slot with a duration of 5 seconds.</p><p>The dataset has been divided in training and test sets by using a temporal split. Specifically: (i) the data gathered in the first 96 hours only contains legitimate traffic and has been used for the learning phase of the autoencoder, whereas (ii) the remaining instances compose the test set. As a result, the training and the test set have 69, 116 and 51, 837 instances, respectively. To normalize the input data feeding the model, a pre-processing phase has been performed. In essence, a MinMax normalization has been used to map each feature in the range {−1, 1} in order to improve the stability of the learning process.</p><p>As discussed in Section 3, the proposed model is a neural network composed of two subnets. The Encoder has four fully-connected dense layers. Three layers have been instantiated with 32, 16, and 8 neurons and equipped with a ReLU (Rectified Linear Unit) activation function. The fourth layer is the latent space and can be thought as a dense layer (shared between the encoder and the decoder) including 4 neurons, and it is equipped with a ReLU activation function. The Decoder is composed again of three fully-connected dense layers with the same dimensions and activation function. Finally, the output layer is instantiated with the same size of the input, and equipped with a Tanh activation function. This choice has been made since we want to yield an output ranging in {−1, 1}. The model is trained over 16 epochs with a batch size of 16.</p><p>To assess the detection capabilities, we computed the following performance metrics. Let us define 𝑇 𝑃 as the number of positive cases correctly classified, 𝐹 𝑃 as the number of negative cases incorrectly classified as positive, 𝐹 𝑁 as the number of positive cases incorrectly classified as negative, and 𝑇 𝑁 as the number of negative cases correctly classified. Then, we considered the following metrics: the Accuracy, defined as the fraction of cases correctly classified, i.e., 𝑇 𝑃 +𝑇 𝑁 𝑇 𝑃 +𝐹 𝑃 +𝐹 𝑁 +𝑇 𝑁 , the Precision and the Recall to measure the accuracy in identifying attacks and avoiding false alarms, i.e., 𝑇 𝑃 𝑇 𝑃 +𝐹 𝑃 and 𝑇 𝑃 𝑇 𝑃 +𝐹 𝑁 , respectively. We also considered the F-Measure to summarize the overall system performances as the harmonic mean of Precision and Recall.</p><p>Lastly, to perform experiments, we used a machine equipped with 32 Gb RAM, an Intel i7-4790K CPU @4.00GHz and an 1Tb SSD disk drive.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Numerical Results</head><p>Since the outlierness threshold can influence the detection capability of the proposed approach, we investigated its impact. As the autoencoder model is trained only against legitimate data (i.e., clean traffic produced by IoT nodes), we computed the outlierness degree for each slot composing the training set. We then selected as the anomaly threshold the values corresponding to the 90 𝑡ℎ , 95 𝑡ℎ and 99 𝑡ℎ percentiles. A detailed breakdown is depicted in Figure <ref type="figure" target="#fig_6">5</ref>.</p><p>Table <ref type="table" target="#tab_1">1</ref> reports experimental results obtained by taking into account different outlierness thresholds computed over the training set. As shown, collected values exhibit an intuitive behavior, i.e., when a more restrictive threshold is selected (99 𝑡ℎ percentile), the approach exhibits a good precision (∼ 94%), but a percentage of slots containing a network covert channel is not correctly recognized. By contrast, a looser threshold value (90 𝑡ℎ percentile) allows to improve the probability of detection (∼ 99% of recall), but a higher number of false alarms are raised. This can be mitigated by considering our mechanism as a first stage of a more complex detection chain, which can trigger more resource-consuming approaches such as deep packet inspection. Yet, the best setting is the one where the 95 𝑡ℎ percentile is used, since it guarantees the highest value in terms of F-Measure. This represents the best trade off between probability of detecting the presence of a covert communication and false alarm rate.</p><p>Moreover, Figure <ref type="figure" target="#fig_7">6</ref> portraits the distribution of the outlierness degree for a window including a marked number of compromised time slots. As it can be seen, the outlierness degree exhibits higher values than the ones reported in Figure <ref type="figure" target="#fig_6">5</ref>. In some cases, the outlierness is one order of magnitude higher than the outlierness max value computed on the training set. This event represents the presence of a covert communications within the bulk of traffic, thus leading to a "deviation" in the output of the neural network.</p><p>Lastly, as regards the feasibility of deploying our approach in realistic settings, we point out that its resource footprint is very limited. In more detail, gathering information about the TTL usually accounts for an additional packet delay of ∼ 100 ns when using eBPF and 1 ms with a C implementation exploiting libpcap over commodity hardware. Instead, apart the training phase, which can be done offline, the average prediction time is 0.0132 ms. Another important aspect concerns the "stateless" nature of the approach. In fact, the used neural architecture performs the detection of covert communications by using information on the overall traffic (grouped in time slots), which prevents memory consumption due to the need of storing information with a per-flow granularity. Thus, the proposed approach should be considered suitable for being implemented in home gateways often used in production-quality IoT ecosystems.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions and Future Work</head><p>In this paper, we presented a lightweight mechanism based on autoencoders for detecting network covert channels targeting IoT scenarios. Results indicated the effectiveness of our approach, i.e., the method can achieve the values of ∼ 91% and ∼ 94% for the accuracy and the precision, respectively. Although our solution addresses a specific case, it can be easily generalized to handle different network covert channels and environments, e.g., by considering an ensemble of specialized detectors combined to reveal attacks on different carriers.</p><p>Future works aim at refining the proposed framework by considering other types of network covert channels. At the same time, part of our ongoing research is devoted to develop some form of "intermediate" representations, which can be used to exploit a unique mechanism to face different threats. We are working towards general metrics that could partially compensate the tight-coupling between the used hiding methodology/protocol and the countermeasure.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Attack model considering a malware sending data towards a remote command and control facility via a network covert channel created within the TTL field of IPv4 traffic.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>Heatmap computed on 1-hour long slices</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: Various heatmaps computed over a 24h traffic trace.</figDesc><graphic coords="5,125.74,100.13,141.95,111.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Detection mechanism used to reveal the presence of network covert channels.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Training-set outlierness with different threshold values.</figDesc><graphic coords="10,139.30,84.20,316.66,131.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Test-set outlierness.</figDesc><graphic coords="10,139.30,255.54,316.66,131.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1</head><label>1</label><figDesc>Experimental results for different outlier thresholds. Values have been selected by computing the outlier scores against the training set and by extracting the correspondent percentile values.</figDesc><table><row><cell cols="5">Threshold Values Accuracy Precision Recall F-Measure</cell></row><row><cell>0.040 -(90 𝑡ℎ perc.)</cell><cell>0.872</cell><cell>0.729</cell><cell>0.991</cell><cell>0.840</cell></row><row><cell>0.055 -(95 𝑡ℎ perc.)</cell><cell>0.901</cell><cell>0.791</cell><cell>0.964</cell><cell>0.869</cell></row><row><cell>0.126 -(99 𝑡ℎ perc.)</cell><cell>0.910</cell><cell>0.937</cell><cell>0.786</cell><cell>0.855</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">An updated list of attacks leveraging information hiding, steganography, and covert channels observed "in the wild" is available online at: https://github.com/lucacav/steg-in-the-wild [Last Accessed: June</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2022" xml:id="foot_1">].</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_2">Data collected for IEEE TMC 2018, University of New South Wales, Sydney. Available online at: https://iotanalytics. unsw.edu.au/iottraces.html [Last Accessed: June 2022].</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_3">List of CVEs targeting IoT nodes/devices maintained by MITRE. Available online at: https://cve.mitre.org/cgi-bin/ cvekey.cgi?keyword=iot [Last Accessed: June 2022].</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_4">TensorFlow machine learning library. Available online at: https://www.tensorflow.org/ [Last Accessed: June 2022].</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been partially supported by the H2020 Program within the framework of SIMARGL (Grant Agreement No. 833042), and CyberSec4Europe (Grant Agreement No. 830929).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations</title>
		<author>
			<persName><forename type="first">N</forename><surname>Neshenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bou-Harb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Crichigno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kaddoum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ghani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="2702" to="2733" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Understanding the Mirai botnet</title>
		<author>
			<persName><forename type="first">M</forename><surname>Antonakakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>April</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bailey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bernhard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bursztein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cochran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Durumeric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Halderman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Invernizzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kallitsis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26th USENIX security symposium (USENIX Security 17)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="1093" to="1110" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Classifying IoT devices in smart environments using network traffic characteristics</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sivanathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">H</forename><surname>Gharakheili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Loi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Radford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wijenayake</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vishwanath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sivaraman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Mobile Computing</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="1745" to="1759" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Cyber reconnaissance techniques</title>
		<author>
			<persName><forename type="first">W</forename><surname>Mazurczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Caviglione</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="86" to="95" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Information hiding as a challenge for malware detection</title>
		<author>
			<persName><forename type="first">W</forename><surname>Mazurczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Caviglione</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Security Privacy</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="89" to="93" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Network intrusion detection system: A systematic study of machine learning and deep learning approaches</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shahid Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">Wai</forename><surname>Shiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Ahmad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Transactions on Emerging Telecommunications Technologies</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page">e4150</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A survey of covert channels and countermeasures in computer network protocols</title>
		<author>
			<persName><forename type="first">S</forename><surname>Zander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Armitage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Branch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="44" to="57" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">DNS covert channel detection method using the LSTM model</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">104</biblScope>
			<biblScope unit="page">102095</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">bccstego: A framework for investigating network covert channels</title>
		<author>
			<persName><forename type="first">M</forename><surname>Repetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Caviglione</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zuppelli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 16th International Conference on Availability, Reliability and Security</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Covert channel detection: Machine learning approaches</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Elsadig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gafar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Using hierarchical statistical analysis and deep neural networks to detect covert timing channels</title>
		<author>
			<persName><forename type="first">O</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Al-Fuqaha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">B</forename><surname>Brahim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jenhani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasilakos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Soft Computing</title>
		<imprint>
			<biblScope unit="volume">82</biblScope>
			<biblScope unit="page">105546</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Snapcatch: automatic detection of covert timing channels using image processing and machine learning</title>
		<author>
			<persName><forename type="first">S</forename><surname>Al-Eidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Darwish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Husari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="177" to="191" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Information hiding: challenges for forensic experts</title>
		<author>
			<persName><forename type="first">W</forename><surname>Mazurczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wendzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page" from="86" to="94" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Covert channels-based stealth attacks in industry 4.0</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alcaraz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bernieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Pascucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lopez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Setola</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Systems Journal</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="3980" to="3988" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Power consumption analysis of the new covert channels in CoAP</title>
		<author>
			<persName><forename type="first">A</forename><surname>Velinov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mileva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Stojanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal On Advances in Security</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="42" to="52" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Tight arms race: Overview of current malware threats and trends in their detection</title>
		<author>
			<persName><forename type="first">L</forename><surname>Caviglione</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Choraś</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Corona</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Janicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Mazurczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pawlicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wasielewska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="5371" to="5396" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Zander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Armitage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Branch</surname></persName>
		</author>
		<title level="m">Covert channels in the IP time to live field</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Swinburne University of Technology Report</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">OS fingerprinting and tethering detection in mobile networks</title>
		<author>
			<persName><forename type="first">Y.-C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Baldi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S.-J</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 Conference on Internet Measurement Conference</title>
				<meeting>the 2014 Conference on Internet Measurement Conference</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="173" to="180" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Reducing the dimensionality of data with neural networks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Hinton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Salakhutdinov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science</title>
		<imprint>
			<biblScope unit="volume">313</biblScope>
			<biblScope unit="page" from="504" to="507" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Greedy layer-wise training of deep networks</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Bengio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pascal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Larochelle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Neural Information Processing Systems</title>
				<imprint>
			<publisher>MIT Press</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="153" to="160" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">pcapstego: A tool for generating traffic traces for experimenting with network covert channels</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zuppelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Caviglione</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 16th International Conference on Availability, Reliability and Security</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Mining malware command and control traces</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mclaren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Russell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Buchanan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 Computing Conference</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="788" to="794" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
