期刊文献+

基于IPv6报头的隐蔽通道分析与防范 被引量:6

Analysis and Preservation of Covert Channel Based on IPv6 Header
下载PDF
导出
摘要 研究IPv6基本报头,从网络安全的角度出发,对其中可被用于隐蔽通道载体的字段及其隐蔽通道构建方法进行分析和探讨,在此基础上提出2类构建方法。探讨基于Hop-Limit字段的比特变换隐蔽通道构建方法,分别给出每种方法的通信容量等关键性能指标。对基于IPv6报头的隐蔽通道的防范措施进行讨论。 This paper researches IPv6 basic header, and from the angle of network security, analyzes and discusses the fields which can be used to explore covert channel, presents two kinds covert channel creating methods. It focuses on the Bit-Convert methods based on Hop-Limit and separately gives out the key performance indictors such as communication capacity to each method. The preserving measures of covert channel based on IPv6 header are discussed.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第14期160-162,165,共4页 Computer Engineering
关键词 网络安全 隐蔽通道 IPV6协议 报头 network security covert channel IPv6 header
  • 相关文献

参考文献6

  • 1Lampson B.A Note on the Confinement Problem[J].Communication of the ACM,1973,16(10):613-615.
  • 2NCSC.NCSC-TG-030-1993 A Guide to Understand Covert Channel Analysis of Trusted System[S].1993.
  • 3Ahsan K.Covert Channel Analysis and Data Hiding in TCP/IP[D].Toronto,Ontario,Canada:University of Toronto,2002.
  • 4Rowland C H.Covert Channel in the TCP/IP Protocol Suite[J].IEEE Transactions on Signal Processing,1997,45(11):2758-2765.
  • 5Handle T,Sanford M.Hiding Data in the OSI Network Model[C]// Proceedings of the 1st International Workshop on Information.Hiding.Cambridge,U.K.:[s.n.],1996.
  • 6Davies J.理解IPv6[M].北京:清华大学出版社,2004:172-181.

共引文献5

同被引文献17

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部