期刊文献+

基于TCP/IP协议的网络隐蔽通道研究 被引量:4

The Research of Covert Channels Based on TCP/IP
下载PDF
导出
摘要 首先基于TCP/IP网络协议中的安全缺陷,给出了4种建立网络隐蔽通道的基本方法;然后,分析了当前主流防火墙以及入侵检测系统对建立这些隐蔽通道的影响;最后,讨论了网络隐蔽通道的防范措施。 This paper presents four basic means to set up covert channels based on TCP/ IP protocol suite and analyzes the affect of firewall and IDS to build them. It also discuss how to prevent covert channels in the TCP/IP protocol suite.
作者 徐杰锋
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2003年第z1期144-150,共7页 Journal of Beijing University of Posts and Telecommunications
关键词 隐蔽通道 TCP/IP 网络安全 covert channel TCP/IP network security
  • 相关文献

参考文献10

  • 1[2]DoD. DoD 5200.28-STD-1985, Trusted computer system evaluation crieria[S].
  • 2[3]ISO/IEC 15408-1999, Information technology-security techniques-evaluation criteria for IT security[S].
  • 3[4]Millen J K 20 Years of covert channel modeling and analysis[J].IEEE Computer Society Symposium on Security and Privacy, 1999.
  • 4[6]Wolf M. Cover channels in LAN protocols[M].Lecture Notes in Computer Science,New York:1989.
  • 5[7]Rowland,Craig H.Covert channels in the TCP/IP protocol suite[EB/OL].URL:http://www.psionic.com/papers/covert/corvert.tcp.txt,1996-11-14.
  • 6[8]edi and teso.ICMP tunneling tool[EB/OL]. URL:http://teso.scene.at/releases.php3,http://teso.scene.at/releases/itunnel-1_2.tar.ga,1999-07-10.
  • 7[9]Vidstrom,Arne.ACK tunneling trojans[EB/OL].URL:http://www.ntsecurity.nu/papers/acktunneling,1999-2000.
  • 8[10]Goguen J A, Meseguer J.Security policy and security models[A].In Proceedings of the 1982 IEEE Symposium on Security and Privacy[C].1982.
  • 9[11]Kemmerer R A, Taylor T.A modular covert channel analysis methodology for trusted DG/UXTM[J].IEEE Trans.on Software Engineering,1996,22.
  • 10[12]Comer D E. Internetworking with TCP/IP,vol.1.Upper Saddle River[M]. N.J.:Prentice Hall,1995.

同被引文献38

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部