期刊文献+

基于微博发表时间的隐蔽信道研究 被引量:2

Research of covert channel based on micro-blog posting time
下载PDF
导出
摘要 隐蔽信道既是隐蔽通信的重要工具,也是黑客窃取信息的重要手段。鉴于微博已成为最流行的互联网应用之一,研究了基于微博发表时间的隐蔽信道模型。发送方把秘密信息编码为微博的发表时间,接收方获取发表时间并解码原信息,实现隐蔽通信。针对微博发表时间的三个典型特性,设计了四种编码方法,并对其信道容量和抗时延抖动能力进行了分析评价。结果表明,以时间间隔和条数特性组合的编码方法的性能最优。 Covert channel is not only an important tool for concealment communication, but also an important means for hack- ers to transmit the stolen information. Since micro-blog became one of the most popular Internet applications, this paper inves- tigated a covert channel based on micro-blog posting time. The poster mapped secret information into the micro-blog posting time, and recovered the original information from the posting time. It proposed four encoding methods based on three typical characteristics of micro-blog posting time. Analyses show that the encoding method which combines the time interval and the number of micro-blog achieves best performance.
作者 周庆 洪颖
出处 《计算机应用研究》 CSCD 北大核心 2014年第9期2769-2772,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61003246)
关键词 微博 时间隐蔽信道 编码方法 时延抖动 micro-blog covert timing channel encoding method delay-jitter
  • 相关文献

参考文献2

二级参考文献17

  • 1卿斯汉,沈昌祥.高等级安全操作系统的设计[J].中国科学(E辑),2007,37(2):238-253. 被引量:16
  • 2Lampson B W. A note on the confinement problem [J]. Communications of the ACM (S0001-0782), 1973, 16(10): 613-115.
  • 3A Snoeren, C Partridge, L Sanchez, et al. Single Packet IP Trace back [J]. ACM/IEEE Transaction on networking (S1063-6692), 2002, 10(6): 721-734.
  • 4S Zander, G Armitage, P Branch. A Survey of Covert Channels and Countermeasures in Computer Network Protocols [J]. IEEE Communications Surveys and Tutorials (S1553-877X), 2007, 9(3): 44-57.
  • 5K Ahsan, D Kundur. Practical Data Hiding in TCP/IP [C]// ACM WKSP Multimedia, Juan-les-Pins, France. USA: ACM, 2002: 7-14.
  • 6Cauich E, Gardenas R G, Watanabe R. Data Hiding in Identification and Offset IP Fields [C]// Proceeding of 5th International Symposium. Guadalajara, Mexico: [s. n.], 2005.
  • 7C G Girling. Covert Channels in LAN's [J]. IEEE Transaction on Soft-ware Engineering (S0098-5589), 1987, 13(2): 292-296.
  • 8S Cabuk, C E Brodley, C Shields. IP covert timing channels: Design and detection [C]// ACM Conference on Computer and Communications Security, Washington, USA. USA: ACM, 2004: 178-187.
  • 9Shah G, Molina A, Blaze M. Keyboards and covert channels [C]// USENIX Conference on Security Symposium, Vancouver, Canada. USA: USENIX, 2006: 59-75.
  • 10Berk V, Giani A, Cybenko G. Covert Channel Detection Using Process Query Systems [C]// Proceedings of Workshop on Flow Analysis, Pennsylvania, USA. USA: CERT, 2005: 5-9.

共引文献3

同被引文献14

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部