期刊文献+

网络时间隐蔽通道的拟合模型特性研究 被引量:2

Analysis on Fitting Model of Network Covert Timing Channel
下载PDF
导出
摘要 随着计算机网络的飞速发展,网络安全越来越受到人们的关注。在众多的攻击手段中,网络隐蔽通道已成为威胁计算机安全的重要来源之一。由于其隐蔽性较高、不易被发现和传输速率高等特点,网络时间隐蔽通道已成为该领域的研究热点之一。针对网络时间隐蔽通道的传输过程,构建了一种模型,并详细阐述了该模型中运用扩展码对隐蔽信息进行编码和调制的过程。在此基础上,分析了该模型下编码符号的概率分布状况,并与正常信道中的泊松分布拟合函数做了比较全面的对比。针对隐蔽通道的特性——隐蔽性和数据传输速率,首次分析了模型中的参数对其隐蔽性和传输速率的影响,并得到了二者之间的变化关系,这对今后网络时间隐蔽通道的构建工作具有一定的指导意义。 With the rapid development of computer network, the security of computer network has caused more and more peoples' attention. Among lots of methods of network attack, network covert channels have become one of the main threats to the security of computers. Because of its undetectable nature and high data transmission rate, covert ti- ming channel has become one of current research hot spots in the field of information security. This paper constructed a model for the transmission process of network covert timing channel. The model describes how to encode and modulate covert messages using spreading code. On the basis,we analyzed the probability distribution of the constructed model, then made a more comprehensive contrast with the Poisson distribution which is used to fit the legitimate channel. Ai- ming at analyzing the concealment and data transmission rate of covert channels, we first analyzed the parameters which impact the above properties of covert timing channels, and also discussed the relationship between these properties, which has certain significance for the future work of network covert timing channels.
作者 杨鹏 赵辉 鲍忠贵 YANG Peng ZHAO Hui BAO Zhong-gui(Beijing Institute of Tracking and Telecommunications Technology, Beijing 100094, China)
出处 《计算机科学》 CSCD 北大核心 2017年第1期145-148,154,共5页 Computer Science
关键词 隐蔽通道 隐蔽性 数据传输速率 模型 编码 Covert channel, Concealment, Data transfer rate, Model, Coding
  • 相关文献

参考文献1

二级参考文献12

  • 1孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 2Lampson B W. A note on the confinement problem [J]; Communications of the ACM, 1973, 16(10): 613-115.
  • 3Snoeren A, Partridge C, Sanchez L, et al. Single packet IP trace back [J]. ACM/IEEE Trans on Networking, 2002, 10 (6) : 721-734.
  • 4Bell D, LaPadula L. Secure computer system: Unified exposition and multics interpretation [R]. Bedford, MA: Mathematical Foundation, 1976.
  • 5Zander S, Armitage G, Branch P. A survey of covert channels and countermeasures in computer network protocols [J]. IEEE Communications Surveys and Tutorials. 2007, 9(3) : 44-57.
  • 6Cauich E, Gomez Cardenas R, Watanabe R. Data hiding in identification and offset IP fields [C] //Proc of the 5th Int Symp. Piscataway, NJ: IEEE, 2005:118-125.
  • 7Moskowitz I S, Miller A R Proc of 1994 IEEE Symp Privacy. Los Alamitos, CA: 56-64 Simple timing channels [C] // on Research in Security and IEEE Computer Society, 1994:.
  • 8Shah G, Molina A, Blaze M. et al. Keyboards and covert channels [C] //Proc of the 15th Conf on USENIX Security Symp. New York: ACM, 2006:5-5.
  • 9Cabuk S, Brodley C E, Shields C. IP covert timing channels: Design and detection [C] //Proe of the llth ACM Conf on Computer and Communications Security. New York : ACM, 2004:178-187.
  • 10Sellke S H, Wang C C, Bagchi S, et al. Covert TCP/IP timing channels: Theory to implementation [C] //Proe of the Annual IEEE Conf on Computer Communications. Piseataway, NJ : IEEE, 2009 : 2204-2212.

共引文献16

同被引文献22

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部