期刊文献+

基于IP报头选项的网络隐蔽通道技术 被引量:6

Network Covert Channel Technique Based on IP Header Option
在线阅读 下载PDF
导出
摘要 为扩展和丰富协议隐写的载体,研究使用IP报头选项进行信息隐藏的可能性。通过对协议规范的分析,发现对选项指针字段的改写可以在选项字段中形成4种新的隐蔽通道。讨论这些隐蔽通道的原理,在模拟真实互联网的环境下实现防止路由器改写的IP选项通道,并结合网络隐蔽通道检测技术研究的最新进展分析对抗隐写分析应采取的措施。 In order to extend and diversify the carrier of protocol steganography, the possibility of concealing messages in IP option is studied. After analyzing the standard of network protocol, four new covert channels can be established in IP header through rewriting of option's pointer field. The principles of covert channels are discussed and channels which can avoid router to overwrite are implemented at Internet circumstance by simulation. The countermeasure to steganalysis which should be taken is analyzed with newest development of network covert channel's detection.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第13期125-127,共3页 Computer Engineering
关键词 信息隐藏 协议隐写 IP报头选项 网络隐蔽通道 information hiding protocol steganography IP header option network covert channel
  • 相关文献

参考文献7

  • 1王永杰,刘京菊,孙乐昌.网络数据通信中的隐蔽通道技术研究[J].计算机工程,2003,29(2):125-126. 被引量:6
  • 2Borders K,Prakash A.Web Tap:Detecting Covert Web Traffic[C]//Proc.of the 11 th ACM Conference on Computer and Communications Security.New York,USA:[s.n.],2004.
  • 3Cabuk S,Bradley C E.IP Covert Timing Channels:Design and Detection[C]//Proc.of the 11th ACM Conference on Computer and Communications Security.New York,USA:[s.n.],2004.
  • 4Fisk G,Fisk M,Papadopoulos C,et al.Eliminating Steganography in Internet Traffic with Active Wardens[C]//Proc.of the 5th Information Hiding Workshop.Noordwijkerhout,Netherlands:[s.n.],2002.
  • 5Tumoian E,Anikeev M.Detecting NUSHU Covert Channels Using Neural Networks[EB/OL].(2005-05-18).http://www.ouah.org/ neural_networks_vs_ NUSHU.pdf.
  • 6杨智丹,刘克胜,李丽.IPv6中的网络隐蔽通道技术研究[J].东南大学学报(自然科学版),2007,37(A01):141-148. 被引量:5
  • 7Giffin J,Greenstadt R,Litwack P,et al.Covert Messaging Through TCP Ttmestamps[C]//Proc.of Workshop on Privacy Enhancing Technologies.San Francisco,USA:[s.n.],2002:194-208.

二级参考文献14

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2邹昕光,金海军,郝克成,孙圣和.基于HTTP协议的参数排序通信隐藏算法[J].计算机工程,2006,32(20):147-149. 被引量:5
  • 3Stevens W R.TCP/IPIllustrated Volume 1:The Protocols[M].北京:机械工业出版社,2000..
  • 4Millen Jonathan.20 years of covert channel modeling and analysis[C]//IEEE Computer Security Symposium on Security and Privacy,Oakland,USA,1999:113-114.
  • 5杨榆 钮心忻 杨义先 等.网络协议信息隐藏技术综述.哈尔滨工业大学学报,2006,38:820-824,856.
  • 6Deering Steve,Hinden R.RFC 2460-Internet protocol version 6 specification[EB/OL].(1998)[2007-07].http://www.ietf.org/rfc/rfc2460.txt.
  • 7Graf Thomas.Messaging over IPv6 Destination Options[EB/OL].(2003)[2007-07].http://net.suug.ch/articles/2003/07/06/ip6msg.html.
  • 8Lucena Norka B,Lewandowski Grzegorz,Chapin Steve J.Covert channelsin IPv6[EB/OL].(2005)[2007-07].http://www.petworkshop.org/2005/workshop/talks/CovertChannelsInIPv6PET2005.ppt.
  • 9Borman D,Deering S,Hinden R.RFC 2675-IPv6 jumbograms[EB/OL].(1999)[2007-07].http://www.ietf.org/rfc/rfc2675.txt.
  • 10Conta A,Deering S.RFC 2463-internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification ICMPv6[EB/OL].(1998)[2007-07].http://www.ietf.org/rfc/rfc2463.txt.

共引文献9

同被引文献35

  • 1丛蓉,王秀坤,李进军,杨南海.基于层次和密度聚类分析的航迹关联算法[J].系统仿真学报,2005,17(4):841-843. 被引量:7
  • 2强亮,李斌,胡铭曾.基于HTTP协议的网络隐蔽通道研究[J].计算机工程,2005,31(15):224-225. 被引量:12
  • 3胡华平,杜昆,刘波,王谷.基于TCP报文的防火墙渗透测试系统的设计与实现[J].计算机工程与科学,2007,29(5):4-7. 被引量:2
  • 4GMing, N. and C., Covert Channels in LAN's. IEEE Transactions on Software Engineering. 1987.
  • 5Lampson B W.A note on the confinement problem[J].Communications of the ACM(S0001-0782),1973,16(10):613-115.
  • 6Helouet L,Jard C Zeitoun.Covert channels detection in protocolsusing scenarios[C]//Security Protocols Verification,Berlin,Germany.USA:IEEE,2003:21-25.
  • 7Cabuk S,Brodley C,Shields C.IP covert timing channels:Designand detection[C]//Computer and Communications SecurityWashington,USA.USA:ACM,2004.
  • 8T Sohn,J Moon,S Lee,D H Lee,J Lim.Covert channel detectionin the ICMP payload using support vector machine[C]//ISCIS,Antalya,Turkey.USA:IEEE,2003:828-835.
  • 9Cabuk S.Network Covert Channels:Design,Analysis,Detection,and Elimination[D].West Lafayette,USA:Purdue University,December 2006.
  • 10I S Moskowitz,M H Kang.Covert Channels Here to Stay?[M].Gaithersburg,MD,USA:Computer Assurance,1994:235-243.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部