期刊文献+

参数自适应设定的隐蔽时间信道 被引量:1

A New Covert Timing Channel:Based on the Adaptive Parameter Selection
下载PDF
导出
摘要 网络隐蔽时间信道具有较高的抗检测性能,受到了国内外的高度关注。载体和调制时间间隔的选择直接影响着信道性能。当前的研究普遍存在载体单一和时间间隔选择不合理的问题,提出了一种自适应参数选择隐蔽时间信道的设计方案。通过分析通信双方的网络流量,自适应的选择载体和设定调制时间间隔。通过与传统隐蔽时间信道设计方案实验对比,发现该方案具有更优的性能。 As network covert timing channel with highly detection resistance ,it has been highly concerned at home and abroad .The selection of carrier and timing interval directly affects the performance of the channel .A new covert timing channel is proposed ,which is based on the adaptive parameter selection .The selection of carrier and time interval are based on the network traffic between the two sides of communicator .Compared with the traditional covert timing channel ,it has been proved to be a better one .
出处 《计算机与数字工程》 2015年第11期2012-2016,共5页 Computer & Digital Engineering
关键词 隐蔽信道 时间间隔 载体 自适应 covert channel time interval carrier adaptive
  • 相关文献

参考文献12

  • 1Lampson B W. A note on the confinement problem[J]. Communications of the ACM, 1973,16(10) : 613-615.
  • 2Zander S, Armitage G J, Branch P. A survey of covert channels and countermeasures in computer network protocols[J2. IEEE Communications Surveys and Tu- torials, 2007,9(1-4) 44-57.
  • 3李彩秋,周亚建,魏更宇.FTP协议信息隐藏方法的研究与改进[J].计算机工程与应用,2013,49(21):111-113. 被引量:5
  • 4廖晓锋,邱桂华.一种基于Web访问模型的网络隐蔽通道[J].计算机系统应用,2013,22(2):10-14. 被引量:2
  • 5Cabuk S, Brodley C E, Shields C. IP covert timing channels: design and detection[C]//Proceedings of the 11th ACM conerence on Computer and communica- tions security. ACM,2004:178-187.
  • 6Cabuk S. Network covert channels., design, analysis, detection, and elimination[D. West Lafagetee. US:Purdue University Doctoral Disertation, 2006.
  • 7Shah G, Molina A, Blaze M. Keyboards and Covert ChannelsC//USENIX Security, 2006.
  • 8Luo X, Chan E W W, Chang R K C. TCP covert tim- ing channels.- Design and detectionC3//Dependable Systems and Networks With FTCS and IX;C, 2008.DSN 2008. IEEE International Conference on. IEEE, 2008: 420-429.
  • 9Gianvecchio S, Wang H, Wijesekera D, et al. Model- based covert timing channels: Automated modeling and evasionEC3//Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2008 : 211-230.
  • 10赵华峰.密码协议中重放攻击的研究[J].科学技术与工程,2008,8(18):5308-5312. 被引量:2

二级参考文献39

共引文献9

同被引文献8

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部