期刊文献+

混合SVM结合信息熵检测ICMP隐通道 被引量:1

ICMP covert channel detection by information entropy and mixture SVM
下载PDF
导出
摘要 攻击者可以将生成的任意信息隐藏在ICMP的有效负载中传递出去,构成了ICMP负载隐通道。在分析ICMP数据流熵标准差和熵值分布特性的基础上,提出了基于信息熵的样本集缩减策略。为提高采用标准支持向量机(SVM)的学习能力与推广能力,建立了若干选取规则,构造出一种有效的混合核函数。最后采用混合SVM结合信息熵的方法检测ICMP隐通道,取得了较快的分类速度和较高的检测率。实验结果表明,采用混合SVM结合信息熵检测ICMP隐通道的方法,是有效的、可行的。 Attackers can generate any information hidden in the payload of ICMP to structure a covert channel.This paper found that 95% of the ICMP packets did not contain covert channel after the analysis of the ICMP data flow distribution characteristics of entropy.Therefore,proposed a method to prune the large training set with entropy.The learning ability and generalization ability of SVM could't work well when used it to detect ICMP covert channel using a single kernel function.It could give some regulations according to which to select a kernel.Based on these regulations,constructed mixtures of kernels.Lastly,it performed well in speed and detection rate when used information entropy and mixture SVM to detect ICMP covert channel.Preliminary experiment results show that the method is efficiently and feasible.
出处 《计算机应用研究》 CSCD 北大核心 2010年第11期4312-4315,共4页 Application Research of Computers
基金 安徽科技学院科研基金资助项目(ZRC2008176) 安徽科技学院教研项目(X200829))
关键词 控制报文协议 隐通道 支持向量机 信息熵 ICMP covert channel support vector machine information entropy
  • 相关文献

参考文献9

  • 1RSA Laboratories. What are covert channels[ EB/OL]. 1999-05. http ://www. rsasecurity. com/rsa/abs/fag/715. html.
  • 2ZANDER S, ARMITAGE G, BRANCHRANCH P. A survey of covert channels and countermeasures in computer network protocols [ J ]. IEEE Communications Surveys and Tutorials, 2007,9 (3):44- 57.
  • 3SOHN T, MOON J, LEE S, et al. Covert channel detection in the ICMP payload using support vector machine [ M]. Berlin: Springer, 2003:828- 835.
  • 4TRABELSI Z, EI-HAJJ W, HAMDY S. Implementation of an ICMP- based covert channel for file and message transfer[ C ]//Proc of the 15th IEEE International Conference on Electronics, Circuits and Systems. 2008 : 894- 897.
  • 5薛晋康,许士博,吴兴龙.基于流量分析的网络隐蔽通道检测模型[J].计算机工程,2002,28(12):46-48. 被引量:8
  • 6ICMP covert channel tools:LOKI2[ EB/OL]. http://www. windowsecurity.com/whitepapers/LOKL2_informationtunneling_program _and _description. html.
  • 7KORTY A J. Analysis of LOKI2, using mtree as a forensic tool, and sharing data with law enforcement [ R ]//GIAC Practical Repository. [ S. l. ] :SANS Institute,2003.
  • 8SMITS G F, JORDAN E M. Improved SVM regression using mixtures of kernel [ C ]//Proc of International Joint Conference on Neural Networks. Hawaii : IEEE, 2002 : 2785- 2790.
  • 9DONG Yu-lin, XIA Zun-Quan, WANG Ming-zheng. An MPEC Model for selecting optimal parameter in support vector machines [ C ]// Proc of the 1 st International Symposium on Optimization and Systems Biology. 2007:351- 357.

二级参考文献1

  • 1中山大学数学力学系.概率论及数理统计[M].北京:人民教育出版社,1985..

共引文献7

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部