期刊文献+

一种针对BitTorrent协议中have消息的隐写分析方法 被引量:3

Steganalysis method for have message in BitTorrent protocol
下载PDF
导出
摘要 网络隐写是一种以计算机网络通信数据为载体的隐蔽通信技术。BitTorrent协议的巨大流量使其成为一种极佳的隐写载体,基于BitTorrent协议have消息的隐写即在此背景下提出,目前公开文献尚无有效的检测算法。基于此,提出了一种基于多特征分类的检测方法。该方法首先提取正常have消息数据流,接着提取均值、方差与直方图特征,最后基于AdaBoost分类器给出了检测结果。实验结果表明,所提方法在观测窗口达到1 000个数据包时对该隐写的识别正确率可达96%,在检测基于have消息的隐写时具有良好效果。 Network steganography is a kind of computer network communication data as the carrier of the hidden communication technology.BitTorrent protocol of the huge flow makes it an excellent steganographic carrier,based on BitTorrent protocol it proposed the steganography of have message in this context,there is no effective detection algorithm in current public literature.Based on this,this paper presented a multi-feature classification based on the detection method.Firstly,it extracted the method from the normal data stream,then it generated the secret data according to the concealed method,and then extracted the normal data and the dense data.Finally,it gave the detection result based on the AdaBoost classifier.The experimental results show that the accuracy of the proposed method can reach 96%when the observation window reaches 1 000 packets,it has good effect in detecting steganography based on have messages.
作者 徐心怡 翟江涛 戴跃伟 Xu Xinyi;Zhai Jiangtao;Dai Yuewei(School of Electronics&Information,Jiangsu University of Science&Technology,Zhenjiang Jiangsu 212003,China)
出处 《计算机应用研究》 CSCD 北大核心 2019年第3期918-920,924,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61702235 61602247 U1636117 61472188) 江苏省自然科学基金资助项目(BK20150472 BK20160840) CCF-启明星辰"鸿雁"科研基金资助项目(2016011)
关键词 BITTORRENT网络 网络隐写分析 信息安全 BitTorrent network network steganalysis information security
  • 相关文献

参考文献2

二级参考文献12

  • 1Stoica I, Morris R, Karger D, et al. Chord: a scalable peer-to-peer lookup service for internet applications[ C ]// Proceedings ACM SIGCOMM 2001. New York: ACM, 2001 : 149-160.
  • 2Wu J P, Wang J H, Yang J H. CNGI-CERNET2: an IPv6 Deployment in China [J]. ACM SIGCOMM Computer Communication Review, 2011, 41 (2) : 48-52.
  • 3Jivika G, Jivesh G, Navkeerat K, et al. An examination of IPv4 and IPv6 network: constraints and various transi- tion mechanisms [ C ] // Proceedings of SoutheastCon 2008. Piscataway: IEEE Press, 2008 : 178-185.
  • 4Min B N, Xiao M Z, Feng Q Y, et al. A simple, universal and scalable approach to migrate applications to hybrid network using ALG [ C ] // Proceedings of GCCW'06. Washington DC: IEEE Computer Society, 2006: 125-128.
  • 5Zhao R, Liu R H, Fu G X. P2P File Sharing Software in IPv4/IPv6 Network [ C ] //Proceedings of ICCSN 2009. Washington DC: IEEE Computer Society, 2009: 367-370.
  • 6Joung Y J, Wang J C. Chord^2: a two-layer chord for reducing maintenance overhead via heterogeneity [ J ]. Computer Networks, 2007, 51 (3) : 712-731.
  • 7吕晓鹏,王文东,龚向阳,马建.混合网中的P2P资源共享机制[J].北京邮电大学学报,2011,34(4):113-117. 被引量:6
  • 8聂荣,聂林,刘超慧,雷振明,兰巨龙.BitTorrent网络特性的测量与研究[J].北京邮电大学学报,2012,35(3):125-128. 被引量:1
  • 9唐红,胡容,朱辉云.BitTorrent网络行为研究综述[J].小型微型计算机系统,2012,33(9):2002-2007. 被引量:6
  • 10陈立全,卢苗,胡爱群,孙晓燕.基于二级定位的编码信道信息隐藏算法[J].通信学报,2013,34(12):120-130. 被引量:4

共引文献9

同被引文献33

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部