[1]张凡,廖文军,杨驰颖. 基于网络协议对等元素编码的隐通道技术研究[J].计算机技术与发展,2015,25(12):118-122.
 ZHANG Fan,LIAO Wen-jun,YANG Chi-ying. Research on Covert Channel Technology Based on Coordinate Element Encoding of TCP/IP Protocols[J].,2015,25(12):118-122.
点击复制

 基于网络协议对等元素编码的隐通道技术研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年12期
页码:
118-122
栏目:
安全与防范
出版日期:
2015-12-10

文章信息/Info

Title:
 Research on Covert Channel Technology Based on Coordinate Element Encoding of TCP/IP Protocols
文章编号:
1673-629X(2015)12-0118-05
作者:
 张凡廖文军杨驰颖
 上海通用识别技术研究所
Author(s):
 ZHANG FanLIAO Wen-junYANG Chi-ying
关键词:
 隐通道TCP/IP对等元素类对等元素二进制编码全排列编码
Keywords:
 convert channelTCP/IPcoordinate elementanalogous coordinate elementbinary encodingfull permutation encoding
分类号:
TP301
文献标志码:
A
摘要:
 隐通道的构建和检测方法一直以来都是信息安全领域内研究和探索较多的话题,而利用网络协议进行隐通道构建是一种重要的隐通道构建方法. 文中对利用网络协议进行隐通道构建的方法进行了总结和归纳,提出了网络协议对等元素和类对等元素的概念,并分别对常见网络协议中对等元素、类对等元素的存在以及利用其进行隐通道的构建方法进行了阐述,并给出了实验仿真结果. 最后针对单协议隐通道的弊端,阐述了多层协议协同式增强构建隐通道的方法. 实验结果表明,基于网络协议中对等元素编码的隐通道具有较高的信道容量,且具有应用范围广、难以被检测的优点.
Abstract:
 Covert channel construction and detection method has been a hotly-discussed topic in the information security field. Using the network protocols to construct covert channel is an important method. The methods of using the Internet protocols to construct covert channel are summarized and concluded,and give the concept of the coordinate element and analogous coordinate element,and introduces the method of constructing the covert channel with coordinate element and analogous coordinate element encoding,and then show the simulation results. Finally,it also explores how to improve the construction of covert channel with the multi-protocol method. Experimen-tal results show that this method has a higher channel capacity,a wide range of applications,and is difficult to be detected.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(12):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(12):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(12):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(12):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(12):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(12):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(12):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(12):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(12):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(12):47.

更新日期/Last Update: 2016-01-29