期刊文献+

高安全级网络中信息隐蔽传输分析及检测

Analysis and Detection of Covert Information Transfers in MLS Network
下载PDF
导出
摘要 针对一种难以用隔离设备消除的、以夹带方式在确定概率分布中隐蔽信息的传输方法,提出了修改的属性偏移检测法和卡方检测法,前者用多个报警值门限来降低多单值检测导致的虚警率,后者选取部分近似均匀概率并进一步合并来提高检测效率.2种方法均不同程度地提高了检出概率. Regarding the issue of network covert channels hidden in overt sources with fixed probability distribution, two detection methods are proposed. One is an improved attribute shift test and the other is a modified Pearson chi-square test. In attribute shift test we use k warnings instead of one warning to indicate detection. In chi-square test we incorporate adjacent probability values. The two methods improve detection accuracy in different degrees. Advantages of the detection methods are verified by experiments.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2011年第8期1226-1230,共5页 Journal of Beijing University of Technology
基金 国家'八六三'计划资助项目(2006AA01Z440) 国家'九七三'计划资助项目(2007CB311100 2007CB31307107)
关键词 网络安全 信息技术 统计分析 network security information technology statistical analysis
  • 相关文献

参考文献10

  • 1GIRLING C G. Covert channels in LAN's[ J], IEEE Transactions on Software Engineering, 1987, 13 (2) : 292-296.
  • 2YAO Li-hong, ZI Xiao-chao, PAN Li, et al. A study of on/off timing channel based on packet delay distribution [ J]. Computers and Security, 2009, 28 (8) : 785-794.
  • 3RONALD W S, GEORGE S K. Predictable design of network-based covert communication systems [ C ]//Symposium on Security and Privacy. Oakland, CA : IEEE, 2008 : 311-321.
  • 4ZOUHEIR T, WASSIM E H, SAFUAT H. Implementation of an ICMP-based covert channel for file and message transfer[ C]// 15th IEEE International Conference on Electronics, Circuits and Systems. Saint-Julien: IEEE. 2008, 894-897.
  • 5胡文涛,薛质,陈楠.基于网络计数器的隐蔽信道[J].上海交通大学学报,2008,42(10):1678-1681. 被引量:1
  • 6SERDAR C, CARLA E B, CLAY S. IP covert timing channels: design and detection [ C ] // Proceedings of the 11 th ACM Conference on Computer and Communications Security. Washington, D.C. : ACM, 2004: 178-187.
  • 7LUO Xia-pu, EDMOND W W C, ROCKY K C C. TCP covert timing channels: design and detection[ C] ///International Conference on Dependable Systems & Networks. Anehorage Alaska: IEEE, 2008: 420-429.
  • 8SEBASTIAN Z, GRENVILLE A, PHILIP B. A survey of covert channels and counter-measures in computer network protocols [J]. IEEE Communications Surveys & Tutorials, 2007, 9(3) : 44-57.
  • 9CAI Zhi-yong, ZHANG Yong. Integrated covert channel countermeasure model in MLS networks [ C ] // International Conference on Information Engineering and Computer Science. Wuhan: ICIECS, 2009: 3755-3758.
  • 10范大茵,陈永华.概率论与数理统计[M].2版.杭州:浙江大学出版社,2003:40—201.

二级参考文献8

  • 1Lampson B W. A note on the confinement problem [J]. Proc of the Communications of the ACM, 1973, 16(10) : 613-615.
  • 2Rowland C H. Covert channels in the TCP/IP protocol suite [EB/OL]. http://www. psionic. com/papers/ covert/corvert. tcp. txt, 1996-11-14.
  • 3Ahsan K. Covert channel analysis and data hiding in TCP/IP [D]. Toronto: Dept of Electrical and Computer Engineering, Univ of Toronto, 2002.
  • 4Giffin J, Greenstadt R, Litwack P, et al. Covert messaging through TCP time stamps [C]//Workshop on Privacy Enhancing Technologies. Passau, Germany: Springer Verlag, 2003 : 194-208.
  • 5Murdoch S, Lewis S. Embedding covert channels into TCP/IP [C]// Proc Information Hiding Workshop. Passau, Germany: Springer Verlag, 2005 : 247-261.
  • 6Bauer M. New covert channels in HTTP:Adding unwitting Web browsers to anonymity sets [C]//Proc ACM Workshop on Privacy in the Electronic Society. New York, USA:ACM, 2003:72-78.
  • 7Danezis G. Covert communications despite traffic data retention[EB/OL]. (2005-1). http://homes. esat. kuleuven. be/_gdanezis/cover. pdf. 2007-09-24.
  • 8John G P.Digital communications[M].北京:电子工业出版社,2005:526-556.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部