期刊文献+

网络数据通信中的隐蔽通道技术研究 被引量:6

Research on Covert Channel Technologies in the Internet Communications
下载PDF
导出
摘要 介绍了隐蔽通道技术的概念,讨论了在网络通信中隐蔽通道存在的技术基础和实现原理,对基于网络通信协议的隐蔽通道技术和基于隐写术的隐蔽通道技术进行了深入分析。在此基础上讨论了隐蔽通道技术的发展趋势并从网络安全的角度给出了对网络通信中隐蔽通道的防范措施。 In the thesis , the conception of covert channels is introduced firstly , then the technology foundation and realization theory of the existing of covert channels in the Internet communications are discussed . The covert channel technologies based on both the network communication protocols and the steganography technologies are emphatically analyzed . Finally , the development trend of the covert channel technologies is discussed , and some preserving measures to the point of network security are also presented .
出处 《计算机工程》 CAS CSCD 北大核心 2003年第2期125-126,242,共3页 Computer Engineering
关键词 网络数据通信 隐蔽通道 隐写术 网络通信协议 信息理论 计算机网络 网络安全 防火墙 Covert channel;Steganography;Network communication protocols
  • 相关文献

参考文献2

二级参考文献3

  • 1林福宗.图像文件格式--WINDOWS编程(上)[M].北京:清华大学出版社,1996..
  • 2陈剑.利用JPEG图像进行隐形传输.全国第二届信息隐藏学术研讨会论文集[M].北京:电子技术应用研究所,2000.113-117.
  • 3陈彤,李忠源.图像隐含信息方法的研究[J].北京理工大学学报,1997,17(6):796-799. 被引量:15

共引文献4

同被引文献33

  • 1强亮,李斌,胡铭曾.基于HTTP协议的网络隐蔽通道研究[J].计算机工程,2005,31(15):224-225. 被引量:12
  • 2ASCII Codes Table[ EB/OL]. http://www. lookuptables, com
  • 3Wolf M. Covert channels in LAN protocols[ M ]. in Proceedings of the Workshop on Local Area Network Secufity,LANSEC, 1989:91 -102.
  • 4Handel T,Sandford M. Hiding data in the OSI network modelk [ R ]. First International Workshop on Information Hiding, May-June 1996.
  • 5Rowl C H. Covert channels in the TCP/IP protocol suite [J]. Tech. Rep. 5, First Monday, Peer Reviewed Journal on the Intemet, July 1997.
  • 6Katzenbeisser S, Petitcolas F. Information Hiding [ M ]. Techniques for Steganography and Digital Watermarking. Computer Securiy Series, 685 Canton Street, Norwood,MA 02062: Artech House, Inc. , 2000.
  • 7Bellovin S M. Security problems in the TCP/IP protocol suite [J]. Computer Communication Review, 1989,19:32 - 48.
  • 8朱先中.如何使用BHO定制你的Internet Explorer浏览器[EB/OL](2006-03-02)http://wwwevget.com/zh-CN/article/1476/default.aspx.
  • 9Borders K,Prakash A.Web Tap:Detecting Covert Web Traffic[C]//Proc.of the 11 th ACM Conference on Computer and Communications Security.New York,USA:[s.n.],2004.
  • 10Cabuk S,Bradley C E.IP Covert Timing Channels:Design and Detection[C]//Proc.of the 11th ACM Conference on Computer and Communications Security.New York,USA:[s.n.],2004.

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部