期刊文献+

网络数据包的标识技术研究

A Research on Identification Technology with Network Data Package
在线阅读 下载PDF
导出
摘要 网络信息化的普及使得内部敏感信息通过网络泄露成为一个比较严重和亟待解决的问题.在对信息隐藏技术和TCP/IP协议原理深入分析的基础上,提出了一种网络数据包的标识嵌入方案.该方案将特定标识嵌入到网络数据包的首部字段中,即可以兼容现有的交换与传输设备,还可以对该网络泄露行为进行后续的检测与跟踪.针对网络数据包的标识模块进行了功能和性能方面的测试,结果表明该设计方案是可行的.论文的研究成果对有效防止敏感信息的网路泄露具有很强的应用参考价值. The Popularization of the network informationizatoou enables the internal sensitive information to reveal the question which through the network into is quite serious and urgently awaits to be solved. This paper provides network packet embed identification project, basis on the information hiding technology, the depth analysis of TCP / IP protocol principle. The project embeds a particular sign in the first field of network packets. This way can not only be compatible with the existing exchange and transmission equipment, but also can detect and track the follow - up network behavior. This paper does tests on the network packets for the identification and monitoring module for the function and performance. The results show that the design is feasible. In this paper, the research result has a strong reference value on the effective prevention the network leakage of sensitive information.
作者 张尚韬
出处 《嘉应学院学报》 2011年第8期16-19,共4页 Journal of Jiaying University
关键词 信息隐藏 数字标识 数据统计分析 Information Hiding Digital Identification Data statistic analysis
  • 相关文献

参考文献4

二级参考文献15

  • 1Stefan Katzenbeisser et al 吴秋新 等.信息隐藏技术:E急写术与数字水印[M].北京:人民邮电出版社,2001..
  • 2.信息E急藏全国学术研讨会论文集[c].西安:西安电子科技大学出版社,2001..
  • 3Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn.Information Hiding : a Survey [ J ] . Proc. IEEE, Special Issue on Protection of Multimedia Content, 1999,87 (7) : 1062-1078.
  • 4The SNOW Home Page. Available WWW: http ://www. dark-side. com. au/snow/, 2002-08.
  • 5Craig H Rowland. (Nov. 1996)Covert Channels in the TCP/IP Protocol Suite Available WWW [ EB/OL ]. http ://www. psionic.com/papers/covertchannels, html, 2002-08.
  • 6IETF RFC Page Available WWW[ EB/OL]. http://www, ietf.org/rfc, html, 2002-08.
  • 7S. Katzenbeisser and F.A.P. Petitcolas, editors, Information Hiding:Techniques for Steganography and Digital Watermarking[M]. Artech House,2000.
  • 8C. H. Rowland.Covert channels in the TCP/IP protocol suite[M].First Monday, 1996.
  • 9B. Chor, A. Fiat, M. Naor and B. Pinkas[M].Tracing Traitors,IEEE Transactions on Information Theory, 46(3),May 2000.
  • 10Banerjee and B. Bhattacharjee, Scalable Secure Group Communication over IP Multicast[J].International Conference on Network Protocols, Riverside, CA,November 10-14, 2001.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部