期刊文献+

一种网络协同隐蔽时间信道模型

Model of synergetic network covert timing channel
下载PDF
导出
摘要 为解决传统网络隐蔽时间信道传输效率低、不可靠等问题,提出一种由多个计算节点协作完成网络信息隐藏的协同隐蔽时间信道(SCTC)模型。在该模型中,采用简单、可靠的同步机制,协调多个网络节点可靠地协同发送隐蔽信息。通过理论分析可知这种信道的效率比传统隐蔽信息的效率高。设计了可靠的、抗干扰的同步协议,确保了隐蔽信道的可靠性。采用了透明的隐蔽信息嵌入法,方便用户使用。为了进一步了解该信道的性能,对SCTC的传输效率、鲁棒性进行了仿真实验。实验结果表明,SCTC的传输效率是传统隐蔽时间信道的2.6倍,其抗检测性和鲁棒性更优。 In order to solve the problem that the traditional network synergetic covert timing channel is unstable and unefficient,the model of synergetic covert timing channel(SCTC) is proposed to send the covert information by several computers collaborated with each other.A reliable communication protocol synchronizing the transmitter and the receiver is designed to ensure the stability of SCTC.To improve the convenience of the covert channel,the covert information is embedded in a transparent way,and the coding scheme of '2-bits to one inter packets delay'is adopted.The results of covert communicate experiments show that,the transmission efficiency of SCTC is about 2.6 times of that of the traditional timing channel,and it has better robustness and the undetectability.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2013年第5期741-747,共7页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60974129 70931002) 江苏省自然科学基金(BK2009388)
关键词 计算机网络 网络安全 隐写 隐蔽时间信道 鲁棒性 computer network network security steganography covert timing channel robustness
  • 相关文献

参考文献13

  • 1钱玉文,赵邦信,孔建寿,王执铨.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(3):423-431. 被引量:17
  • 2王永吉,吴敬征,曾海涛,丁丽萍,廖晓锋.隐蔽信道研究[J].软件学报,2010,21(9):2262-2288. 被引量:48
  • 3钱玉文,王飞,孔建寿,王执铨.基于多智能体的网络信息隐藏系统研究[J].南京理工大学学报,2009,33(3):302-306. 被引量:2
  • 4Serdar Cabuk,Carla E. Brodley,Clay Shields.IP Covert Channel Detection[J]. ACM Transactions on Information and System Security (TISSEC) . 2009 (4)
  • 5Alex C. Snoeren,Craig Partridge,Luis A. Sanchez,Christine E. Jones,Fabrice Tchakountio,Beverly Schwartz,Stephen T. Kent,W. Timothy Strayer.Single-packet IP traceback[J]. IEEE/ACM Transactions on Networking (TON) . 2002 (6)
  • 6Butler W. Lampson.A note on the confinement problem[J]. Communications of the ACM . 1973 (10)
  • 7X. Wang,D. S. Reeves.Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. Proceedings of the 10th ACM conference on Computer and communications security . 2003
  • 8S. Zander,G. Armitage,P. Branch.A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys & Tutorials . 2007
  • 9Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays. (Technical Report TR536) :Department of Computer Science,Dartmouth College . 2005
  • 10Gaurav Shah,Andres Molina,Matt Blaze.Keyboards and covert channels. USENIX Security Symposium . 2006

二级参考文献28

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部