期刊文献+

一种针对Skype时间特性拟合的网络隐写检测方法 被引量:1

Method for network steganalysis based on time characteristic of Skype traffic
下载PDF
导出
摘要 网络隐写检测是实现网络可管可控的重要技术支撑。与传统网络隐写相比基于模型拟合的时间式隐写具有更高的隐蔽性,使其成为研究热点。近年来研究者提出了一种拟合Skype应用时间特性的网络隐写方法。由于载体的广泛应用,该方法一经提出便受到极大关注,而目前尚无有效的检测方法。首先通过实验验证了该方法可抵抗基于信息熵的检测算法,进而提取网络数据流时间序列的Markov转移特性、信息熵、均值与方差、DCT(discrete cosine transform)系数以及ε-相似度五种典型特征,最后通过BP(back propagation)神经网络进行分类给出检测结果。实验表明,所提检测方法针对此种隐写算法检测率可达99%,虚警率低于3%,同时通过多样性实验验证了所提方法的鲁棒性。 Network steganalysis is an important technical to support network security. Compared with the traditional network steganography,the model-based steganography had higher concealment and it was the research hotspot in recent years,it brought great challenges to steganalysis. Recently,researchers had proposed a method of network steganography which based on time characteristic of Skype traffic. The method had received great attention since it was proposed,and there was no effective detection method now. First the experimental results showed this new method could resist the algorithm based on information entropy,then five typical characteristics of time series of network flow were extracted. The characteristics included Markov shift matrix,information entropy,mean-variance ratio,discrete cosine transform( DCT) coefficients and ε-similarity. Finally,the analysis results were given by back propagation( BP) neural network. The experimental results show that detection rate is99%,and false positives less than 3%. At the same time,the robustness of the proposed method is verified by experiments.
作者 李萌 翟江涛 戴跃伟 Li Meng;Zhai Jiangtao;Dai Yuewei(School of Electronics & Information,Jiangsu University of Science & Technology,Zhenjiang Jiangsu 212003,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第6期1803-1807,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61472188 61602247) 江苏省自然科学基金资助项目(BK20150472 BK20160840) CCF-启明星辰"鸿雁"基金资助项目(2016011)
关键词 模型拟合 隐写检测 多特征 神经网络 model-based steganalysis muhi-feature neural network
  • 相关文献

参考文献4

二级参考文献115

  • 1华元彬,蒋建春,卿斯汉.基于链路分析法的复合隐蔽通道检测[J].计算机应用,2006,26(1):81-83. 被引量:2
  • 2孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 3Burnett S , Feamster N. Making Sense of Internet Censorship: A new frontier for Internet measurement [J], Computer Communication Review, 2013, 43(3): 84-89.
  • 4Dingledine R, Mathewson N, Syverson P. Tor: The second-generation onion router [C]// Proc 13 th USENIX Security Symposium. San Diego: USENIX Press, 2004: 303-320.
  • 5Reiter M, Rubin A. Crowds: Anonymity for Web transactions [J], ACM Trans Information and System Security, 1998, 1(1): 66-92.
  • 6Freedman M, Morris R. Tarzan: A peer-to-peer anonymizing network layer [C]// Proc 9th ACM Conference Computer and Communications Security. Washington D C: ACM Press, 2002: 193-206.
  • 7Rennhard M, Plattner B. Introducing morphmix: Peer-to-Peer based anonymous Internet usage with collusion detection [C]// Proc ACM Workshop on Privacy in the Electronic Society. Washington D C: ACM Press, 2002: 91-102.
  • 8Nambiar A, Wright M. Salsa: A structured approach to large-scale anonymity [C]// Proc \3th ACM Conference Computer and Communications Security. Alexandria: ACM Press, 2006: 17-26.
  • 9Mittal P, Borisov N. Shadowwalker: Peer-to-Peer anonymous communication using redundant structured topologies [C] IIProc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 161-172.
  • 10Panchenko A, Richter S, Rache A. Nisan: Network information service for anonymization networks [C]// Proc 16th ACM Conference Computer and Communications Security. Chicago: ACM Press, 2009: 141-150.

共引文献19

同被引文献7

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部