期刊文献+

基于HTTP协议的隐蔽信道研究 被引量:10

Research on Covert Channel Based on HTTP Protocol
原文传递
导出
摘要 HTTP协议是目前Internet上使用最广泛的协议。HTTP协议语法定义较为宽松,并且在HTTP协议定义的许多头域中存在着大量具有随机特性的部分,这就为隐蔽信道的构造提供了条件。论文提出了一种利用Date头域时间值的随机性构造隐蔽信道的思想,实现了一种在大流量载体信息下,利用低带宽隐蔽信道传输任意量隐蔽信息的方法,并分析了该隐蔽信道的性能。 The HTTP protocol is used widely in Internet, its syntax definition is definition is relatively relaxed, and a great amount of the parts with random characteristics existed in the header field defined in HTTP protocol, thus providing the condition for constructing covert channels. A new idea is proposed in the paper to construct a covert channel based on time value randomness of the Date header field, thus a method is realized, in which arbitrary hidden information can be transmitted in a large number of information carriers with low-bandwidth of covert channel, and also the performance of the covert channel is analyzed.
出处 《信息安全与通信保密》 2009年第1期73-74,77,共3页 Information Security and Communications Privacy
关键词 隐蔽信道 HTTP协议 网络安全 Date头域 covert channel HTTP protocol network security date header field
  • 相关文献

参考文献1

二级参考文献13

  • 1MILLEN J.20 Years of covert channels modeling and analysis[C]//Proceeding of the IEEE Computer Society Symposium on Research in Security and Privacy,1999:113-114.
  • 2ANDERSON R J,PRTITCOLAS F A P.On the limits of steganog raphy[J].IEEE Journal of Selected Areas in Communications,1998,16(4):474-481.
  • 3AHSAN K.Practical data hiding in TCP/IP[C]//ACM Multimedia 2002 Workshop W2-Workshop on Multimedia and Security:Authentication,Secrecy,and Steganalysis,2002:7-14
  • 4ROWLAND C H.Covert channels in the TCP/IP protocol suite,Tech[J].Rep5,First Monday.Peer Reviewed Journal on the Internet,1997(7).
  • 5AHSAN K.Covert channel analysis and data hiding in TCP/IP[D].Dept of Electrical and Computer Engineering,University of Toronto,2002-08.
  • 6FIELDING R.RFC2161:Hypertext transfer protocol-HTTP/1.1[S/OL].1999-06-01.http://www.ietf.org.rfc.rfc2616.txt.
  • 7FREED N,BORENSTEIN N.RFC2045:Multipurpose Internet Mail Extensions(MIME)Part One:Format of Internet Message Bodies[S/OL].1996-11-01.http://www.ietf.org/rfc/rfc2045.txt.
  • 8BAUER M.New covert channels in HTTP:Adding Unwitting Web Browsers to Anonymity Sets[C].//Proceedings of the ACM Workshop on Privacy in the Electronic Society,2003:72-78.
  • 9KRISTOL D,MONTULLI L.RFC 2109:HTTP state management mechanism[S/OL].1997-02-01.http://www.ietf.org/rfc/rfc2109.txt.
  • 10FRANKS J.RFC2617:HTTP Authentication:Basic and Digest Access Authentication:Basic and Digest Authentication[S/OL].1999-06-01.http://www.ietf,org/rfe2617.txt.

共引文献5

同被引文献79

  • 1史晓敏,刘飞.浅析基于DNS协议的隐蔽通道及监测技术[J].保密科学技术,2011(4):61-65. 被引量:4
  • 2卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 3祝瑞,车敏.基于HTTP协议的服务器程序分析[J].现代电子技术,2012,35(4):117-119. 被引量:47
  • 4邹昕光.基于FTP协议的命令序列隐蔽信道[J].哈尔滨工业大学学报,2007,39(3):424-426. 被引量:7
  • 5Simmons G J. The prisoner' s problem and the subliminal channel[C]//David Chaum. Advances in Cryptology: Proc. of CRYPTO' 83. USA: Plenum Press, 1984:51-67.
  • 6Desmedt Y, Claude Ooutier, Samy Bengio. Special Uses and Abuses of The Fiat-Shamir Passport Protocol[C]//Carl Pomerance. Advances in Cryptology: Proc. of CRYPTO' 87, LNCS 293. Berlin: Springer-Verlag, 1987:21-39.
  • 7Desmedt Y. Subliminal-free Authentication and Signature[C]// Christoph G GUnther. Advances in Cryptology: Proc. of EUROCRYPT' 88, LNCE330. Berlin: Springer-Verlag, 1988:23-33.
  • 8Desmedt Y, Yung M. Unconditional subliminal-freeness in Unconditional Authentication Systems[C]. [s.l.]: IEEE Publications, 1991:176.
  • 9Desmedt Y, Yung M. Minimal cryptosystems and defining subliminal-freeness[C].[s.l.]:IEEE Publications, 1994: 347.
  • 10Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, et al. A Progress Report on Subliminal-Free Channels[C]//Anderson R. Proc. of Information Hiding: First International Workshop. Berlin: Springer Verlag, 1996:157-168.

引证文献10

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部