期刊文献+

基于GTALK即时通讯协议的隐蔽通道研究 被引量:1

Research of covert channel based on GTALK instant messenger protocol
下载PDF
导出
摘要 针对现有基于公共网络通信协议的网络隐蔽通道易被检测的不足,详细分析了第三方即时通讯协议GTALK,利用GTALK文本消息通信模型,提出了一种基于GTALK即时通讯协议构建网络隐蔽通道的方法,给出了该隐蔽通道方案的详细设计和代码框架,GTALK协议本身的"合法性"为该隐蔽通道的伪装提供了有利条件。实验测试表明,该隐蔽通道具有良好的穿透性和隐蔽性。针对该隐蔽通道可能被恶意利用而带来的危害,给出了几点防御建议。 To alleviate the weakness of existed network covert channels in anti-detection, GTALK instant messenger protocol is analyzed and, a new method of constructing covert channel based on GTALK chat is proposed, and the detail design and code framework is provided. The legality of GTALK provides protection of the covert channel. In the end some experiments are car- ried to verify that the covert channel has excellent penetrability and covertness, and some safety suggestions are given to protect against this kind of network covert channel.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第12期4471-4475,共5页 Computer Engineering and Design
关键词 XMPP协议 即时通讯 身份认证 隐蔽通道 穿透性 隐蔽性 XMPP protocol instant messenger authentication covert channel penetrability covertness
  • 相关文献

参考文献9

  • 1QIAN Yu wen, SONG Huaju, WVNG Fei? et al. Network covertchannel encoding by packet length- Design and detection [J].Journal of Computational Information Systans, 2011,7 (5):1463-1471.
  • 2Indumath SKI, Kadhar Nawaz. Towards designing a stealthycommunication channel for hidden information [J]. InternationalJournal of Engineering Science and Technology, 2011,3 (5):3486-3489.
  • 3王娟,郭永冲,王强.基于BHO的网络隐蔽通道研究[J].计算机工程,2009,35(5):159-161. 被引量:6
  • 4Sebastian Zander, Grenville Armitage, Philip Branch. A surveyof covert channels and countermeasures in computer networkprotocols [J]. IEEE Communications Surveys &- Tutorials,2007, 9 (3): 44-57.
  • 5Kenton Born. PSUDP ? A passive approach to network-widecovert communication [C]. USA: Black Hat USA 2010, 2010.
  • 6Vincent Berk, Annarita Giani, George Cybenko. Detection ofcovert channel encoding in network packet delays [R]. Hano-ver: Dartmouth College, 2005.
  • 7Tinx Google wave and XMPP [EB/OL]. http: //hi. baidacom/jabber/blog/item/d821fbde89fb6c5c94ee3789. html, 2009.
  • 8Bluehands. Myjingle-a Libjingle demo for Win/MFC [EB/OL].http://www. bluehands. de/software/beat/myjingle/2008.
  • 9Google. Google talk for developers [EB/OL]. http: //code,google, com/apis/talk/index, html, 2008.

二级参考文献4

共引文献5

同被引文献10

  • 1Huang Y,Tang S,Bao C,et al.Steganalysis of compressed speech to detect covert voice over Internet protocol channels[J] .Information Security,IET,2011,5(1):26-32.
  • 2Sridhar S.Method of intercepting VoIP communications:U.S.Patent 20,130,039,226[P] .2013-02-14.
  • 3Google.WebRTC FAQ[EB/OL] .[2014-01-11] .http://www.webrtc.org/faq#TOC-What-is-the-iSAC-audio-codec.
  • 4Introduce of iSAC[EB/OL] .[2012-02-14] .http://www.cnblogs.com/gaozehua/archive/2012/02/14/2350477.html.
  • 5Google.WebRTC code package[CP/OL] .[2014-01-11] .https://code.google.com/p/webrtc/source/checkout.
  • 6Oskycar.About windows API record[EB/OL] .[2013-06-13] .http://www.360doc.com/content/13/0613/18/2036337_292631223.shtml.
  • 7Google.Google talk for developers[CP/OL] .[2013-05-15] .https://developers.google.com/talk/?hl=zh-CN.
  • 8Liu Y,Shen Y,Liu Q,et al.Performance evaluation and accuracy upgrading of PESQ in Chinese environment[C] //IEEE 77th Vehicular Technology Conference.IEEE,2013:1-5.
  • 9杨俊,柏森,黄永峰,袁键.以Bol SipPhone语音流为载体的信息隐藏方法实现[J].计算机应用研究,2011,28(5):1901-1903. 被引量:1
  • 10袁键,周学思,黄永峰.HOOK技术在网络隐蔽通信中的应用[J].四川大学学报(自然科学版),2011,48(3):539-545. 被引量:6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部