期刊文献+

网络时间隐蔽信道研究 被引量:2

A Survey of Network-based Covert Timing Channels
下载PDF
导出
摘要 文章首先介绍隐蔽信道的基本概念以及网络隐蔽信道的研究现状,然后着重总结几种典型的网络时间隐蔽信道,最后综述网络时间隐蔽信道领域中经典的防御技术和方法。文章试图为该研究方向勾勒出一个较为全面的概貌,为该领域的研究人员提供有益的参考。 This paper firstly introduces the concept of covert channel, and then gives an overview of network- based covert channels. Next, it summarizes several typical network-based covert timing channels. Finally, it surveys the classic countermeasures in the field of network-based covert timing channels. This paper attempts to give a comprehensive outline for this research direction, and provides a useful reference for the researchers.
出处 《信息网络安全》 2012年第8期160-163,共4页 Netinfo Security
基金 国家自然科学基金[70890084 G021102] 中国科学院战略性先导专项子课题海云信息安全共性关键技术研究[XDA06010702]
关键词 信息安全 隐蔽信道 网络时间隐蔽信道 information security covert channel network-based covert timing channel
  • 相关文献

参考文献7

  • 1Lampson BW. A note on the confinement problem[J]. Communications of the ACM, 1973,16(10):613-615.
  • 2National Computer Security Center Department of Defense Trusted Computer System Evaluation Criteria[R]. DoD 5200.28-STD, December 1985.
  • 3Tsai CIK, Gligor VD, Chandersekaran CS. A formal method for the identification of covert storage channels in source code[C]. In: Proc.of the IEEE Symp. on Security and Privacy. 1987. 74-87.
  • 4Simmons GJ. The prisoners' problem and the subliminal channel[C]. In: Proc. of the CRYPTO' 83-Advances in Cryptology. 1984.51-67.
  • 5T. Handel, M. Sandford. Hiding Data in the OSI Network Model[C]. Proc. 1st Int' 1. Wksp, Information Hiding, 1996.23-38.
  • 6Girling CG. Covert channels in LAN' s. IEEE Trans. on Software Engineering[C]. 1987,SE-13(2):292-296. [doi:10.1109/TSE.1987.233153].
  • 7S. Gianvecchio, H. Wang, Detecting covert timing channels: an entropy-based approach[C]. In: CCS' 07: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, 2007.307-316.

同被引文献13

引证文献2

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部