期刊文献+

基于DNA编码的网络隐蔽存储信道设计方法 被引量:1

A novel network covert storage channel algorithm based on DNA coding
下载PDF
导出
摘要 针对网络隐蔽存储信道如何隐秘而高效地传输秘密信息问题,提出一种基于DNA编码机制的网络隐蔽存储信道设计方法,该方法利用数据包报头中合法字段传送秘密信息。发送方先将秘密信息借用DNA编码机制得到二进制序列,再利用Arnold变换对二进制序列进行置乱,最后将置乱后的随机二进制序列嵌入到多个数据包报头中,接收方可采用相反的过程恢复隐秘信息。在TCP/IP网络中构建了该隐蔽信道及实验,结果表明:同等条件下,该方法不仅使用的数据包数量最少,而且平均时间开销也减少了22%左右,表现出较好的效果。 For the problem that how to make the network covert storage channel transfer secret message covertly and efficiently ,a novel method of designing network covert storage channel is proposed .This method stores the secret information in the legal fields of packet’s header .The sender firstly does DNA coding for secret message and produces binary stream ,then scrambles this binary stream via Arnold transform ,lastly this scrambled binary stream is embedded into the same field of many packets’ header .The receiver can easily recover the secret message through the reverse process of the sender ’ s doing . This proposed scheme is implemented and tested in real TCP/IP network .The experimental results show that for transferring the same secret message ,the proposed method not only uses the least number of packet ,but also decreases the time cost about 22% ,compared with other existing methods .
作者 高屹
出处 《实验技术与管理》 CAS 北大核心 2014年第6期141-145,共5页 Experimental Technology and Management
基金 西藏自治区自然科学基金重点资助项目(12KJZRZMY01)
关键词 网络隐蔽存储信道 信息安全 DNA编码 ARNOLD变换 network covert storage channel information security DNA code Arnold transform
  • 相关文献

参考文献13

  • 1Moulin P, O'Sullivan J A. Information-theoretic analysis of Infor- mation Hiding [J]. IEEE Transactions on Information Theory, 2003,49(3) :563-593.
  • 2Lampson B. A note on the confinement problem[J]. Communica- tion of the ACM,1973,10(16):613-615.
  • 3Hoffman C, Johnson D, Yuan B, et al. A Covert Channel in TTL Field of DNS Paekets [C]//In Proceedings of 2012 International Conference Security and Management. Las Vegas: Elsevier,2012.
  • 4Johnson D, Lutz P, Yuan B. Behavior-based covert channel in Cy- berspace[C]// Proceedings of Intelligent Decision Making Sys- tems, New Jersey, 2009 :311-318.
  • 5Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Su- jatha. Connecting entropy-based detection methods and entropy to detect covert timing ehannels[J]. Advances in Computing and Infor- mation Technology, 2012,176 (1) : 279-288.
  • 6Cabuk S,Brodley C E,Shields C,et al. IP covert timing channels: design and detection[C]// Proceedings of the llth ACM Confer- ence on Computer and Communications Security, Washington DC, 2004 : 178-187.
  • 7Murdoch S J, Lewis S. Embedding Covert Channels Into TCP/IP [C]// Proceedings of Information Hidding'05. Berlin, Heidelberg: Springer-Verlag, 2005.
  • 8Ahsan K, Kundur D. Practical Data Hiding in TCP/IP[C]// Pro- ceedings of Workshop on Multimedia Security at ACM Multimedia ' 02 ,Juan-les-Pins (on the French Riviera) : ACM, 2002.
  • 9Zhai J, Liu G, Dai Y. An Improved Retransmission based Network Steganography: Design and Detection[J]. Journal of Networks, 2013,8(1) : 182-188.
  • 10Liu Hongjun, Lin Da, Kadir A. A novel data hiding method based on deoxyribonucleic acid coding[J]. Computers and Electrical En- gineering. 2013,39(4):1164 11 73.

同被引文献12

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部