期刊文献+

StegoP2P:一种基于P2P网络的隐蔽通信方法 被引量:10

StegoP2P:A Hidden Communication Approach in P2P Networks
下载PDF
导出
摘要 随着互联网的发展,隐私保护问题越来越突出,现有的匿名通信系统如Tor,Freenet等能够隐藏用户的身份,但是不能够隐藏通信的事实.以BitTorrent,emule为代表的P2P文件分享软件已经成互联网的主要应用,而且其用户规模庞大,分布在全球各地.在此基础之上提出一种新的隐蔽通信方法——StegoP2P,该方法不依赖于任何单一的系统或者接入点,而是利用P2P协议的隐蔽通道;并设计一个有效的隐蔽握手协议,让P2P网络中互为好友(合谋)但素未谋面的节点隐蔽握手,秘密交换信息,从而绕过网络审查.实验结果和安全性分析表明我们的系统具有较高的性能和健壮性,并能够抵御常见的流量审查. With the development of Internet, privacy-preserving has become an increasingly prominent problem. Existing anonymous communication systems, such as Tor and Freenet, can conceal who communicate with whom. However they can't hide the fact that the users are using the anonymous communication technologies. File share software, such as BitTorrent and emule, has become the most popular application in Internet with users all over the world. In this paper, we present StegoP2P, a peer-to-peer based hidden communication method, which doesn't rely on a single system or a set of entry points. It is based on embedding the steganographic marker in the peer-to-peer meta-data exchange protocol, unlike other existing covert communication methods that rely on timing channel, and requires time synchronization. An efficient covert handshake protocol with steganographic marker techniques over peer-to-peer networks is proposed for unobservable communications, which allows users in peer-to-peer networks to exchange information secretly for circumventing Internet censorship. The steganography makes it easy for users to find the targeted content and difficult for a censor to identify them. Experimental results and security analysis show that our system has high performance and can defense against certain traffic censorships.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第8期1695-1703,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61100174) 国家"八六三"高技术研究发展计划基金项目(2011AA010701 2012AA013101) 国家科技支撑计划项目(2012BAH37B04)
关键词 隐私保护 隐蔽握手 隐蔽通道 对等网络 分布式散列表 privacy-preserving secret handshakes covert channel peer-to-peer DHT
  • 相关文献

参考文献19

  • 1Piatek M, Kohno T, Krishnamurthy A. Challenges and directions for monitoring P2P file sharing networks-or: Why my printer received a DMCA takedown notice [C] //Proc of USENIX Association HOTSEC'08. Berkeley, CA: USENIX Association, 2008:1-7.
  • 2Siganos G, Pujol J M, Rodriguez P. Monitoring the bittorrentmonitors: A bird's eye view [C] //Proc of the 10th Int Conf on Passive and Active Network Measurement. Berlin: Springer, 2009:175-184.
  • 3Piatek M, Isdal T, Krishnamurthy A, et al. One hop reputations for peer to peer file sharing workloads [C]//Proc of the 5th USENIX Symp on Networked Systems Design and Implementation. Berkeley, CA: USENIX Association, 2008, 1-14.
  • 4Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system [C]//Proc of Int Workshop on Designing Privacy Enhancing Technologies : Design Issues in Anonymity and Unobservability. Berlin: Springer, 2001:46-66.
  • 5Isdal T, Piatek M, Krishnamurthy A, et al. Privacy- preserving P2P data sharing with OneSwarm [C] //Proe of ACM SIGCOMM'10. New York: ACM, 2010:111-122.
  • 6Cabuk S. Network covert channels: Design, analysis, detection, and elimination [D]. West Lafayette, IN: Purdue University, 2006.
  • 7Shah G, Molina A, Blaze M. Keyboards and covert channels [C] //Proc of the 15th Conf on USENIX Security Symp. Berkeley, CA: USENIX Association, 2006:59-75.
  • 8Cabuk S, Brodley C E, Shields C. IP covert timing channels: Design and detection [C] //Proc of ACM CCS'04. New York: ACM, 2004:178-187.
  • 9Gianvecchio S, Wang H. Detecting covert timing channels: An entropy-based approach [C]//Proc of ACM CCS'07. New York: ACM, 2007:307-316.
  • 10Berk V, Giani A, Cyhenko G. Detection of covert channel encoding in network packet delays, TR536 [R]. Hanover, NH: Department of Computer Science, Dartmouth College, 2005.

同被引文献52

引证文献10

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部