期刊文献+

基于数据包时间间隔的隐蔽通道实现及检测方法研究 被引量:2

Covert Channel Implementation based on Between-Packet Time Intervals and Detection Method
下载PDF
导出
摘要 网络隐蔽通道是以网络通信数据为载体,通过将秘密信息隐藏在数据包协议载荷中或者利用数据包的一些特征进行隐蔽传输的手段。网络信息传输面临巨大风险,隐蔽通信已经成为当前研究的热点。因此,通过分析网络数据包的不同属性传递隐蔽信息,以构建隐蔽通道。重点介绍了基于ICMP数据包时间间隔的隐蔽通道构建原理和方法,并实现了此种隐蔽通道,分析了其隐蔽通道传输性能。最后,理论分析了基于时间间隔构建隐蔽通道的检测方法及面临的问题。 Network covert channel, with network communication data as the carrier, by hiding the secret information in the packet protocol payload or utilizing some characteristics of the packet, transmits the secret information. Network information transmission faces great risks, and the convert communication now becomes the research hotspot. The covert channel is constructed by analyzing the different attributes of network packets in transferring the hiding information. The construction principle and method of covert channel based on the time interval of ICMP packet are emphatically described, including the implementation of covert channel, and the transmission performance of covert channel also discussed in detail. Finally, the detection method and the problem of covert channel based on time intervals are analyzed theoretically.
作者 姬国珍 谭全福 JI Guo-zhen;TAN Quan-fu(No.30 Institute of CETC, Chengdu Sichuan 610041, China)
出处 《通信技术》 2018年第1期189-194,共6页 Communications Technology
关键词 隐蔽通道 时间间隔 ICMP报文 检测 covert channel time interval ICMP packet detection
  • 相关文献

参考文献1

二级参考文献11

  • 1[1]J Agat. Transforming out timing leaks[C].In:27th annual ACM sigplan sigact symposium on principles of programing languages boston,2000
  • 2[2]U.S.DoD.Trusted Computer Systems Evaluation Criteria. 1983
  • 3[3]J Haigh et al. An experience using two covert channel analysis tech niques on a real system design[J].IEEE transactions on software engineering, 1987; se- 13 (2)
  • 4[4]B Lampson et al.note on the confinement problem[J].Communican tions of the ACM, 1993; 16(10) :613~615
  • 5[5]J Millen.20 years of covert channel modeling and analysis[C].ln:99'IEEE security and privacy symposium, 113~114
  • 6[6]Ira S Moskowits et al. Simple Timing Channel[C].In:proceedings of he IEEE computer society symposium on research in security and privacy, Okaland, CA, 1994-05: 56~64
  • 7[7]C Tsai et al.a formal method for the identification of covert storage channels in source code[C].In:87' IEEE symposium on security and privacy
  • 8[8]R Kemmerer. Shared Resource Matrix Methodology:An approach to identifying storage and timing channel.1983
  • 9[9]J A Goguen,J Meseguer. Security Policies and Security Models[C].In: Proceedings of the IEEE Symposium on Security and Privacy ,Oak-land, California, 1982-04:11~20
  • 10[10]J Ne,V D Gligor. Information Flow Analysis for Covert-Channel I dentification in Multilevel Secure Operating Systems[C].In:Proceedings of the 3rd IEEE Workshop on Computer Security Founcdations,Franconia,New Hampshire, 1990-06:139~148

共引文献12

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部