期刊文献+

一种可靠双盲的IP时间隐通道 被引量:1

Reliable and double-blind IP covert timing channel
下载PDF
导出
摘要 针对现有的IP时间隐通道需要事前约定IP数据包的时间间隔与传输信息之间的编码方案,不能在收发过程中根据网络的传输质量进行双盲动态调整的问题,提出了一种IP时间隐通道编码方案的双盲动态调整策略。该策略通过细分网络环境,并针对不同网络环境动态选择预设的编码方案,实现了收发双方间编码方案的双盲动态调整。为了验证策略的可靠性,实现了这种可靠双盲的IP时间隐通道。实验结果表明,该策略能够较好地实现收发双方间的双盲动态调整。 To solve the problems that the existing IP covert timing channel needs to make an early agreement on the encoding scheme between the information and IP packet timing interval,and cannot dynamically the double-blindly adjust the encoding scheme according to the network transmission quality in the process of sending and receiving,a double-blind dynamic adjustment strategy to negotiate IP covert timing channel encoding scheme was proposed.By segmenting the network environment and depending on the dynamic network environment,the strategy selected the default encoding scheme,and achieved double-blind dynamic adjustment of encoding scheme between sender and receiver.In order to verify the reliability of strategy,the experimental environment of covert timing channel was constructed.The results show that the proposed method can achieve double-blind dynamic adjustment between sender and receiver.
出处 《计算机应用》 CSCD 北大核心 2012年第6期1636-1639,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61003288) 江苏省自然科学基金资助项目(BK2010192) 教育部博士点基金资助项目(20093227110005) 江苏省六大人才高峰项目(1631170006) 江苏省高校自然科学研究计划项目(07KJB520016) 江苏大学高级人才项目(07JDG053)
关键词 IP时间隐通道 IP数据包抖动时间 编码机制 抗干扰 双盲通信策略 IP covert timing channel IP packet jitter time encoding mechanism anti-jamming double-blind communication strategy
  • 相关文献

参考文献12

  • 1LAMPSON B W. A note on the confinement problem[ J]. Communi-cations of the ACM, 1973, 16(10) :613 -615.
  • 2王昌达,鞠时光,周从华,宋香梅.一种隐通道威胁审计的度量方法[J].计算机学报,2009,32(4):751-762. 被引量:12
  • 3朱虹,冯玉才.隐通道识别技术研究[J].计算机科学,2000,27(5):100-103. 被引量:6
  • 4TRABELSI Z, HESHAM E, FRIKHA L, et al . A novel covert channel based on the IP header record route option[ J]. Internation- al Journal of Advanced Media and Communication, 2007, 1 (4) : 328 - 350.
  • 5孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 6卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 7SHAH G, MOLINA A, BLAZE M. Keyboards and covert channels [C]// Proceedings of the 15th Conference on USENIX Security Symposium. Berkeley, CA: USENIX Association Berkeley, 2006:59 - 75.
  • 8YAO LIHAO, ZI XIAOCHAO, PAN LI, et al . A study of on/off timing channel based on packet delay distribution[ J]. Computers & Security, 2009, 28(8) : 785 - 794.
  • 9CABUK S, BRODLEY C E, SHIELDS C. IP covert timing chan- nels: design and detection[ C]//ACM Conference on Computer and Communications Security. New York: ACM Press, 2004:178 - 187.
  • 10BERK V, GIANI A, CYBENKO G. Detection of covert channel en- coding in network packet delays[ EB/OL]. [ 2011-09-20]. http:// www. ists. dartmouth, edu/library/149, pdf.

二级参考文献77

共引文献65

同被引文献11

  • 1张连成,王振兴,徐静.一种基于包序重排的流水印技术[J].软件学报,2011,22(2):17-22.
  • 2Wang Xiaogang, Yang Ming, Luo Junzhou. A novel se- quential watermark detection model for efficient trace- back of secret network attackflows [ J ]. Journal of Net- work and Computer Application:, 2013,36 ( 6 ) : 1660 - 1670.
  • 3Wang Xiaogang, Luo Junzhou, Yang Ming. An efficient sequential watermark detection model for tracing network attack flows [ C ] //Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Coopera- tive Work in Design. Piscataway: IEEE Computer Socie- ty,2012:236 - 243.
  • 4Pyun Young June, Park Younghee, Reeves Douglas S, et al. Interval-based flow watermarking for tracing interac- tive traffic[J]. Computer Networks,2012,56(5) :1646 - 1665.
  • 5Pyun Young June, Park Young Hee, Wang Xinyuan, et al. Tracing traffic through intermediate hosts that repac- ketize flows [ C ]//Proceedings of the 26th IEEE Interna- tional Conference on Computer Communications. Ancho- rage : IEEE,2007 : 634 - 642.
  • 6Houmansadr Amir, Kiyavash Negar, Borisov Nikita. RAINBOW: a robust and invisible non-blind watermark for network flows [ C ] J/Proceedings of the 16th Annual Network & Distributed System Security Symposium. [ S. 1. I : The Internet Society,2009:224 -236.
  • 7Pan Zheng, Peng Hong, Long Xianzhong, et al. A wa- termarking-based host correlation detection scheme [C]//Proceedings of 2009 International Conference on Management of e:Gommerce and e-Government. Nan- chang, China: IEEE Computer Society, 2009:493 - 497.
  • 8张璐,罗军舟,杨明,何高峰.基于时隙质心流水印的匿名通信追踪技术[J].软件学报,2011,22(10):2358-2371. 被引量:20
  • 9王新宇,詹永照.基于顶点范数的三维模型鲁棒数字水印算法[J].江苏大学学报(自然科学版),2011,32(6):695-700. 被引量:4
  • 10张连成,王振兴,刘慧生.网络流水印技术研究进展[J].计算机科学,2011,38(11):7-11. 被引量:4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部