期刊文献+

一种提高链路层加密比特流识别率的新方法 被引量:1

New method to improve identification rate of encrypted bit stream in data link layer
下载PDF
导出
摘要 为识别链路层比特流是否加密,以未加密与加密数据在随机统计特性上的差异为依据,利用随机性检测的方法对加密比特流进行识别。在不同比特流长度条件下对四种典型随机性检测方法的识别率进行了比较研究。针对用户数据对未加密比特流识别率影响较大的问题,提出了基于分块游程检测及块内码元频数方差的用户数据起始位估计方案,并对提出的方案进行了评估。实验结果表明,提出的方案可显著将剔除用户数据后的未加密比特流识别率由41.23%提高到92%以上。 To identify the encrypted bit stream of data link layer, this paper used randomness tests based on the difference of statistical characteristics of unencrypted and encrypted bit stream. It compared four typical randomness tests under different length of bit stream. As the user data affected the identification rate, it proposed and assessed estimation schemes of user data's start bit based on run test within blocks and variance of bit frequency within blocks. Experimental results show that the proposed scheme can significantly improve the identification rate of unencrypted bit stream after removing the user data from 41.23 percent to over 92 percent.
出处 《计算机应用研究》 CSCD 北大核心 2015年第11期3443-3447,共5页 Application Research of Computers
基金 军内科研资助项目(YJJXM12033)
关键词 链路层 加密比特流 随机性检测 用户数据 data link layer encrypted bit stream randomness test user data
  • 相关文献

参考文献13

  • 1龙文,马坤,辛阳,杨义先.适用于协议特征提取的关联规则改进算法[J].电子科技大学学报,2010,39(2):302-305. 被引量:11
  • 2吴志军,阚洪涛.基于ECC的TES网络链路层安全协议的研究[J].通信学报,2009,30(11):86-92. 被引量:13
  • 3张杨.基于NDIS的数据链路层加密[J].辽宁大学学报(自然科学版),2010,37(2):116-118. 被引量:7
  • 4DOD ( Dep~u'tment of Defense). MIL-STD- 188- 220C [ EB/OL]. (2002-05-22) [2012-06-29]. http://www, everyspcc, com.
  • 5Wright C V, Monrose F, Masson G M. On inferring application proto- col behaviors in encrypted network traffic [ J ]. Journal of Machine Learning Research, 2006, 7(12) : 2745-2769.
  • 6Sun Guanglu, Xue Yibo, Dong Yingfei, et al. A novel hybrid method for effectively classifying encrypted traffic [ C ]//Proc of Global Tele- communications Conference. [ S. 1. ] : IEEE Press, 2010: 1-5.
  • 7Tabatabaei T S, Adel M, Karray F, et al. Machine learning-based classification of encrypted Internet traffic [ C ]//Proc of the 8th Inter- national Conference on Machine Learning and Data Mining in Pattern Recognition. Berlin : Springer, 2012 : 578- 592.
  • 8Zhang Meng, Zhang Hongli, Zhang Be. Encrypted traffic classifica- tion based on an improved clustering algorithm[ C ]//Proc of Interna- tional Conference on Trustworthy Computing and Services. Berlin: Springer, 2012 : 124-131.
  • 9Du Ye, Zhang Ruhui. Design of a method for encrypted P2P traffic identification using K-means algorithm [ J]. Telecommunication Systems, 2013, 53(1 ): 163-168.
  • 10赵博,郭虹,刘勤让,邬江兴.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345. 被引量:41

二级参考文献43

  • 1薄彦娜,陈豪.浅谈信息战中通信卫星系统安全性[J].空间电子技术,2006,3(B11):1-4. 被引量:2
  • 2石昌贤,徐大雄,杜军.VSAT网络协议AA/TDMA的时延特性[J].北京邮电大学学报,1997,20(2):61-67. 被引量:1
  • 3KRASNER. Using elliptic curve cryptography (ECC) for enhanced embedded security: financial advantages of ECC over RSA or Diffie-Hellmann(DH)[A]. Embedded Market Forecasters, American Technology[C]. 2004.1-27.
  • 4MORRIS A J, KAY S. Telephony earth station[A]. Global Telecommunications Conference 1989 and Exhibition. Communications Technology for the 1990s and Beyond, GLOBECOM '89[C]. IEEE 1989.1719- 1722.
  • 5PARK J H, LIM S B. Key distribution for secure vsat satellite communications[J]. IEEE Transactions on Broadcasting, 1998,44(3).
  • 6YI X, SIEW C K. Security of Park-Lim key agreement schemes for VSAT satellite communications[J]. IEEE Transactions on Vehicular Technology, 2003, 52(2):465-468.
  • 7MARAL G.. VSAT Network[M]. Germantown MD USA, John Wiley & Sons Ltd, 2003, 2nd Edition.
  • 8SEN S, SPATSCHECK O, WANG D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//WWW 2004: Proceedings of Thirteenth International World Wide Web Conference. New York: ACM Press, 2004: 512-521.
  • 9HAMZA D, SANDRINE V, DAVID R. A markovian signature-based approach to IP traffic classification[C]// MineNet'07: Proceedings of the Third Annual ACM Workshop on Mining Network Data. San Diego: ACM Press, 2007: 29-34.
  • 10HAFFNER P, SEN S, SPATSCHECK O, et al. ACAS: Automated construction of application signatures[C]// Proceedings of ACM SIGCOMM 2005 Workshops: Conference on Computer Communications. Philadelphia: ACM Press, 2005: 197-202.

共引文献91

同被引文献7

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部