期刊文献+

基于多智能体的网络信息隐藏系统研究 被引量:2

Network Steganography System Based on Multi-Agent
在线阅读 下载PDF
导出
摘要 为加强网络信息安全,该文提出了一种基于m-序列的多智能体协作的信息隐藏模型,并提出以鲁棒性、安全性和通信容量作为评价信息隐藏系统的性能指标。实现了基于多智能体协作的信息隐藏系统,该系统通过多智能体协作加强信息隐藏的鲁棒性,使用多智能体发送信息,加大了隐蔽通信的容量。仿真结果表明:基于多智能体的信息隐藏算法未对特殊位进行处理,因而没有网络包被防火墙过滤,隐藏的信息未丢失;防火墙类产品对于使用包填充类算法隐藏的信息的安全性影响非常大,对于使用基于多智能体算法隐藏的信息的安全性几乎没有任何影响。 A model of multi-Agent collaboration way to hide information based on m-serial is presented to protect security of network information. Capacity, robustness and security are proposed to e- valuate the performance of network steganography system. According to the mode, a network steganography system is developed. The system strengthens the robustness of steganography by multi-A- gent cooperation, sends information by multi-Agent, and the capacity of covert communication is increased. Simulation results show that the hiding information is not lost because the network steganography algorithms do not deal with the special bits of network packet, so that it is not interfered by the fire wall ; impact of the security products like firewall on the security of hiding imformation is very large for those algorithms which hide imformation by filling special bit of network packet, but these products play little role on the network steganography system.
出处 《南京理工大学学报》 EI CAS CSCD 北大核心 2009年第3期302-306,311,共6页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60574082) 江苏省自然科学基金(BK2008403)
关键词 网络 数据安全 多智能体系统 智能体 信息隐藏 隐蔽信道 networks security of data multi-Agent systems Agent steganography covert channel
  • 相关文献

参考文献11

二级参考文献42

  • 1刘志煌,余永权,刘滔.在扩频中引入OFDM实现PLC高速通信的方案[J].计算机工程与设计,2005,26(3):716-718. 被引量:3
  • 2汪芸.CORBA技术及应用[M].南京:东南大学出版社,1999..
  • 3(美)RobertOrfail 陈章渊等(译).智能CORBA[M].北京:电子工业出版社,1999..
  • 4张洁.基于多Agent的车间管理控制系统的建模与实现(863科技报告)[M].,2000..
  • 5NorthcuttS.网络入侵检测分析员手册[M].北京:人民邮电出版社,2000..
  • 6樊昌信,张甫翊,徐炳祥,等.通信原理[M].北京:国防工业出版社,2003.
  • 7[1]Bender W,Gruhl N,Lu A M.Techniques for data hiding.IBM Systems Journal, 1996, 35(3-4):313~336
  • 8[2]Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps.International Journal of Bifurcation and Chaos, 1998, 8(6):1 259~1 284
  • 9[3]Hartung F,Kutter M.Multimedia watermarking techniques.Proceedings of the IEEE, 1999,87(7):1 079~1 107
  • 10[4]Swanson M D,Kobayashi M,Tewfik A H.Multimedia data-embedding and watermarking technologies.Proceedings of the IEEE, 1998,86(6):1 064~1 087

共引文献79

同被引文献24

  • 1丛蓉,王秀坤,李进军,杨南海.基于层次和密度聚类分析的航迹关联算法[J].系统仿真学报,2005,17(4):841-843. 被引量:7
  • 2Lampson B W.A note on the confinement problem[J].Communications of the ACM(S0001-0782),1973,16(10):613-115.
  • 3Helouet L,Jard C Zeitoun.Covert channels detection in protocolsusing scenarios[C]//Security Protocols Verification,Berlin,Germany.USA:IEEE,2003:21-25.
  • 4Cabuk S,Brodley C,Shields C.IP covert timing channels:Designand detection[C]//Computer and Communications SecurityWashington,USA.USA:ACM,2004.
  • 5T Sohn,J Moon,S Lee,D H Lee,J Lim.Covert channel detectionin the ICMP payload using support vector machine[C]//ISCIS,Antalya,Turkey.USA:IEEE,2003:828-835.
  • 6Cabuk S.Network Covert Channels:Design,Analysis,Detection,and Elimination[D].West Lafayette,USA:Purdue University,December 2006.
  • 7I S Moskowitz,M H Kang.Covert Channels Here to Stay?[M].Gaithersburg,MD,USA:Computer Assurance,1994:235-243.
  • 8X Zou,Q Li,S H Sun,et al.The Research on Information HidingBased on Command Sequence of FTP Protocol[C]//Knowledge-Based Intelligent Information.Berlin,Germany:Springer-Verlag,2005:1079-1085.
  • 9Richard Lippmann,Joshua W Haines,David J Fried,JonathanKorba,Kumar Das.The 1999 DARPA online intrusion detectionevaluation[J].Computer Networks(S1389-1286),2005,34(4):579-595.
  • 10Gianvecchio S,Wang H.Detecting covert timing channels:Anentropy based approach[C]//Proceedings of ACM Conference onComputer and Communications Security.Alexandria,USA:ACM,2007:307-316.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部