期刊文献+

网络隐蔽信道实现机制及检测技术研究 被引量:15

Implementation and Detection of Network Covert Channel
下载PDF
导出
摘要 网络隐蔽信道利用正常网络协议传递隐蔽信息,能够为木马、间谍软件等恶意通信规避安全检测提供载体。针对现有隐蔽信道数量众多、特征繁杂、检测不便等问题,在分析其通信模型及应用模式的基础上,提出了一种基于实现机制的分类方法,从协议和字段的根本特点出发研究了隐蔽信道的异常特征,分析了现有检测方法及其缺陷,给出了下一步的研究方向。 Network covert channel uses normal network protocols to pass hidden information,which can provide carriers for Trojan,spyware etc.to circumvent security detection.Aiming at the problems that number of convert channels is large,the features are complicated and the detection is inconvenient,we analysed the communication model and application model,proposed a classification method based implementation mechanisms and abnormal features of network covert channel according to the basic features of protocols and fields,analysed existing detection methods and their weaknesses.And the future research direction was given.
出处 《计算机科学》 CSCD 北大核心 2015年第7期216-221,244,共7页 Computer Science
基金 国家973计划项目(2011CB311801) 河南省科技创新人才计划项目(114200510001)资助
关键词 网络隐蔽信道 实现机制 异常特征 检测技术 Network covert channel Implementation mechanism Abnormal features Detection techniques
  • 相关文献

参考文献63

  • 1Lampson B W. A note on the confinement problem[J]. Commu- nications of the ACM, 1973,16(10) : 613-615.
  • 2Girling C G. Covert Channels in LAN' s[J]. IEEE Transactions on Software Engineering,1987(2) :292-296.
  • 3Kratzer C,Dittmann J, Vogel T, et al. Design and Evaluation of Steganography for Voice-over-IPEC//Proceedings of 2006 IEEE International Symposium on Circuits and Systern(ISCAS 2006). IEEE, 2006.
  • 4ltes A, Mood B, Pletcher J, et al. On detecting co-resident cloud instances using network flow watermarking techniques [J]. International Journal of Information Security, 2014,13 (2) : 171-189.
  • 5Ranjith P, Priya C, Shalini K. On covert channels between virtual machines[J]. Journal in Computer Virology, 2012,8 (3) : 85-97.
  • 6Fisk G, Fisk M,Papadopoulos C, et al. Eliminating steganogra- phy in Internet traffic with active wardens[C]//Petitcolas F A P, ed. Information Hiding: 5th International Workshop, IH 2002. Springer Berlin Heidelberg, 2003:18-35.
  • 7Lucena N B, Lewandowski G, Chapin S J. Covert channels in IPv6[C]//Danezis G, Martin D, eds. Privacy Enhancing Tech- nologies: 5th International Workshop, PET 2005. Springer Ber-lin Heidelberg,2006 : 147-166.
  • 8Zander S, Arrnitage G J, Branch P. A survey of covert channels and countermeasures in computer network protocols[J]. IEEE Communications Surveys and Tutorials, 2007,9 (1-4) : 44-57.
  • 9Gianvecchio S, Wang H. Detecting covert timing channels: an entropy-based approach[C] //Proceedings of the 14th ACM con- ference on Computer and communications security. ACM, 2007: 307-316.
  • 10Simmons G J. The prisoners problem and the subliminal chan- nel[C]//Advances in Cryptology. Springer US, 1984:51-67.

二级参考文献38

共引文献92

同被引文献79

引证文献15

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部