期刊文献+
共找到303篇文章
< 1 2 16 >
每页显示 20 50 100
Integrated criteria for covert channel auditing
1
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security covert channel covert channel auditing
在线阅读 下载PDF
Detecting DNS Covert Channels Using Stacking Model 被引量:2
2
作者 Peng Yang Ye Li Yunze Zang 《China Communications》 SCIE CSCD 2020年第10期183-194,共12页
A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS co... A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS covert channels are easily used by attackers for malicious purposes.Therefore,an effective detection approach of the DNS covert channels is significant for computer systems and network securities.Aiming at the difficulty of the DNS covert channel identification,we propose a DNS covert channel detection method based on a stacking model.The stacking model is evaluated on a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively.Besides,it can identify unknown covert channel traffic.The area under the curve(AUC)of the proposed method reaches 0.9901,which outperforms existing detection methods. 展开更多
关键词 DNS covert channel stacking model
在线阅读 下载PDF
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
3
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between vip and virtual machine monitor to pass data directly. The vip machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 VIRTUALIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
Analysis and Application of Covert Channels of Internet Control Message Protocol
4
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded Internet terminal (EIT) algorithm information security
在线阅读 下载PDF
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
5
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
6
作者 Lejun Zhang Xiaoyan Hu +5 位作者 Zhijie Zhang Weizheng Wang Tianwen Huang Donghai Guan Chunhui Zhao Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2020年第9期2013-2030,共18页
Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect c... Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect content of communication.The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator.However,because the establishment of proxy communication needs to consume traffic,the communication capacity will be reduced,and in recent years,the tor technology often has vulnerabilities that led to the leakage of secret information.In this paper,the covert channel model of the packet ordering is applied into the distributed system,and a distributed covert channel of the packet ordering enhancement model based on data compression(DCCPOEDC)is proposed.The data compression algorithms are used to reduce the amount of data and transmission time.The distributed system and data compression algorithms can weaken the hidden statistical probability of information.Furthermore,they can enhance the unknowability of the data and weaken the time distribution characteristics of the data packets.This paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity,transmission efficiency,and transmission performance.According to the analysis results,it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering,which saves the transmission time and improves the concealment compared with the original covert channel. 展开更多
关键词 covert channels information hiding data compression distributed system
在线阅读 下载PDF
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
7
作者 Xiao-Hang Wang Shou-Bin Li +5 位作者 Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第4期396-415,共20页
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signa... When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signal,from which the original sensitive data can be recovered.As a forceful countermeasure against the ISCC attack,strong noise can be used to jam the channel and literally shut down any possible sound data transmission.In this paper,enhanced ISCC is proposed,whose transmission frequency can be dynamically changed.Essentially,if the transmitter detects that the covert channel is being jammed,the transmitter and receiver both will switch to another available frequency and re-establish their communications,following the proposed communications protocol.Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source.Correspondingly,a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel.With the proposed countermeasure,the bit error rate(BER)of the data communications over enhanced ISCC soars to more than 48%,essentially shutting down the data transmission,and thus neutralizing the security threat. 展开更多
关键词 COUNTERMEASURE inaudible sound covert channel(ISCC)
在线阅读 下载PDF
Auditing the Use of DBMS Covert Storage Channels Relevant with Transactions
8
作者 朱虹 FENG +2 位作者 Yucai Zhou Chun 《High Technology Letters》 EI CAS 2002年第1期17-22,共6页
This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next... This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next, the paper analyzes and resolves the two problems arising from auditing the use of transaction-type covert storage channels in database systems: namely, the relationship between channel variables, which are altered (or viewed) by the transaction and satisfy integrity constraints in DBMS, and database states; and the circumvention of covert storage channel audit in DBMS. 展开更多
关键词 covert storage channels AUDIT Transaction Integrity constraint Circumvention of audit
在线阅读 下载PDF
Arm架构的分支预测器隐蔽信道研究
9
作者 杨毅 吴凭飞 +7 位作者 邱朋飞 王春露 赵路坦 张锋巍 王博 吕勇强 王海霞 汪东升 《信息安全学报》 2025年第1期1-16,共16页
隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介... 隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介质种类很多,如时间、功耗、温度等。在现代处理器中,分支预测器作为重要的微架构组件,有效提高了处理器的流水线效率,但由于分支预测器在核内的多进程间共享,使得其存在被用于构建隐蔽信道的风险。目前Intel x86架构已被发现存在基于分支预测器的隐蔽信道攻击,但是Arm架构是否存在相似的攻击还没有得到充分的研究。本文中,我们成功在Arm架构的实际硬件平台上构建了三种基于分支预测器的隐蔽信道。首先我们在Arm架构下设计并实现了类似于x86架构下的基于分支预测器的隐蔽信道CC和RSC,其次我们发现了一个新的基于分支预测组件BTB的隐蔽信道BTBC。我们评估并分析了隐蔽信道参数对信道性能的影响及其成因,并给出参数设置建议。在Cortex-A53及Cortex-A72两种核心上,我们对三种隐蔽信道的信号特性、传输速率和误码率进行了测试和对比分析。实验表明在实际的Arm架构硬件平台下,BTBC的传输信号边缘清晰,震荡幅度小。在连续传输数据时表现出与CC和RSC近似的信道性能,并且在两种核心上均可以低误码率进行数据传输,其在200bps的传输速率下,仅有2%的误码率。最后我们还给出了对于此类隐蔽信道的防御措施。 展开更多
关键词 ARM架构 分支预测器 隐蔽信道
在线阅读 下载PDF
低空智融网络可靠传输基础研究
10
作者 张雪 邓君 +2 位作者 刘明远 张宇明 张宏科 《河南科技大学学报(自然科学版)》 北大核心 2025年第4期1-7,M0002,共8页
低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合... 低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合网络层、资源适配层与低空服务层3层,并设计跨网协同传输、多径灵活调度、编码冗余增强以及隐蔽信道传输等核心技术,旨在通过架构创新与技术融合,全面提升低空智联网的传输效率与可靠保障能力。实验结果表明,所提方案有效传输速率较单路传输提升至少1倍,网络编码译码成功率较传统方法平均提升11.05%,隐蔽信道传输正确率较传统算法提升了至少10%。 展开更多
关键词 低空智联网 跨网协同 多径传输 网络编码 隐蔽信道
在线阅读 下载PDF
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing
11
作者 Omar Darwish Shorouq Al-Eidi +4 位作者 Abdallah Al-Shorman Majdi Maabreh Anas Alsobeh Plamen Zahariev Yahya Tashtoush 《Computers, Materials & Continua》 2026年第1期2231-2251,共21页
Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remain... Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remains one of the security challenges. is paper proposes LinguTimeX,a new framework that combines natural language processing with arti cial intelligence,along with explainable Arti cial Intelligence(AI)not only to detect CTC but also to provide insights into the decision process.LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely.LinguTimeX demonstrates strong e ectiveness in detecting CTC across multiple languages;namely English,Arabic,and Chinese.Speci cally,the LSTM and RNN models achieved F1 scores of 90%on the English dataset,89%on the Arabic dataset,and 88%on the Chinese dataset,showcasing their superior performance and ability to generalize across multiple languages. is highlights their robustness in detecting CTCs within security systems,regardless of the language or cultural context of the data.In contrast,the DeepForest model produced F1-scores ranging from 86%to 87%across the same datasets,further con rming its e ectiveness in CTC detection.Although other algorithms also showed reasonable accuracy,the LSTM and RNN models consistently outperformed them in multilingual settings,suggesting that deep learning models might be better suited for this particular problem. 展开更多
关键词 Arabic language Chinese language covert timing channel CYBERSECURITY deep learning English language language processing machine learning
在线阅读 下载PDF
时间型网络隐蔽信道检测技术分析
12
作者 肖尧 周建群 《工业信息安全》 2025年第5期28-36,共9页
随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生... 随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生了严重威胁。因此,检测并发现流量中存在的时间型网络隐蔽信道已成为提高网络空间安全防御能力的关键一环。本文针对时间型网络隐蔽信道检测技术,系统阐述网络隐蔽信道的基本定义及其构建技术的发展现状,在此基础上,重点解析传统时间型隐蔽信道检测方案的技术原理与应用局限,并详细考察分析了近三年基于机器学习的检测方案。文章进一步结合时间型隐蔽信道构造技术的演进规律,提出检测技术未来发展的潜在方向。 展开更多
关键词 时间型网络隐蔽信道 时间型网络隐蔽信道检测 机器学习 网络安全
在线阅读 下载PDF
APT攻击中隐蔽通信信道的多维度检测模型构建
13
作者 谭金臻 方娜 《办公自动化》 2025年第15期96-98,共3页
文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模... 文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模态决策。实验基于扩展CICIDS2017数据集验证,TCDM在DNS隧道、HTTPS隐蔽通道及ICMP传输检测中分别达到98.7%、95.1%与93.4%的准确率,误报率低至2.8%,AUC值达0.9745,较传统方法显著提升。其流式处理引擎支持15ms级实时检测,并在实际部署中成功阻断供应链攻击,表明模型兼具理论先进性与工程实用性,为APT防御提供新范式。 展开更多
关键词 APT攻击 隐蔽通信 隐蔽信道检测 多维度检测
在线阅读 下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
14
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 covert channel TIMING channel INTRUSION Detection VIRTUALIZATION Software-Defined Network
在线阅读 下载PDF
微架构安全漏洞攻击技术综述 被引量:2
15
作者 王泉成 唐明 《密码学报(中英文)》 CSCD 北大核心 2024年第6期1199-1232,共34页
随着研究人员发现越来越多存在信息泄漏的微架构优化设计,相关攻击技术与防御技术的研究也成为学术界和工业界研究的热点.本文从处理器微架构设计的角度出发,按照时间侧信道攻击、暂态攻击和隐蔽信道攻击的分类模式,系统性地归纳研究人... 随着研究人员发现越来越多存在信息泄漏的微架构优化设计,相关攻击技术与防御技术的研究也成为学术界和工业界研究的热点.本文从处理器微架构设计的角度出发,按照时间侧信道攻击、暂态攻击和隐蔽信道攻击的分类模式,系统性地归纳研究人员已经发现的微架构安全漏洞的攻击技术,包括攻击分类、对应漏洞、攻击原理、受威胁的安全机制.然后,基于微架构攻击利用的微架构漏洞以及攻击原理,提出了一种用于分析处理器微架构的脆弱性的有向无环图模型.该模型将攻击流程中的操作与处理器微架构的共享资源相结合,并且对每类微架构攻击分别建模,从而可以更好地理解微架构攻击的根本原因和攻击原理.此外,还从漏洞验证、防护评估等多个角度分析了有向无环图模型的应用优势,并提出一种新型的微架构攻击与一种缓存时间侧信道防护策略.最后,从攻击和防御两个方向展望了处理器安全领域未来的研究方向和发展趋势. 展开更多
关键词 处理器安全 微架构设计 侧信道攻击 暂态攻击 隐蔽信道攻击 系统安全
在线阅读 下载PDF
基于OSPF协议Hello报文隐蔽信道构建研究 被引量:1
16
作者 赵自强 李强 郭涛 《网络安全与数据治理》 2024年第2期16-22,共7页
现有存储型网络隐蔽信道的研究主要根据不同协议中不同字段来隐藏信息。在众多协议中,例如TCP、UDP协议,对其研究较多,而OSFP使用广泛却在国内研究较少。针对OSPF协议下的Hello报文进行分析可以构建网络隐蔽信道的字段。从所有可能字段... 现有存储型网络隐蔽信道的研究主要根据不同协议中不同字段来隐藏信息。在众多协议中,例如TCP、UDP协议,对其研究较多,而OSFP使用广泛却在国内研究较少。针对OSPF协议下的Hello报文进行分析可以构建网络隐蔽信道的字段。从所有可能字段中选择Authentication、Router Dead Interval和Neighbor三个字段分别使用随机值模式、值调制模型和序列模式进行构建三种隐蔽信道,利用微协议技术优化信道,并将三种隐蔽信道组合成一个传输速率更高的隐蔽信道模型。经过验证,该模型具有一定的可行性和隐蔽性,可为存储型网络隐蔽信道构建技术提供一定的理论支持和技术支撑。 展开更多
关键词 OSPF 网络隐蔽信道 隐蔽信道构建 微协议
在线阅读 下载PDF
区块链环境下隐蔽信道研究综述 被引量:2
17
作者 张璇 李雷孝 +1 位作者 杜金泽 史建平 《计算机科学与探索》 CSCD 北大核心 2024年第6期1438-1456,共19页
隐蔽信道是将信息隐藏在公开的通信信道中进行隐蔽传输的方法,旨在保证数据传输的安全性,使第三方对隐蔽通信的过程毫无察觉。然而,随着流量分析技术的不断进步,传统的网络隐蔽信道已经无法保证其安全性。区块链作为一种新兴技术,结合... 隐蔽信道是将信息隐藏在公开的通信信道中进行隐蔽传输的方法,旨在保证数据传输的安全性,使第三方对隐蔽通信的过程毫无察觉。然而,随着流量分析技术的不断进步,传统的网络隐蔽信道已经无法保证其安全性。区块链作为一种新兴技术,结合了密码学、共识算法和P2P网络,具有去中心化、可追溯性、匿名性、不可变性和安全性等特性,成为了构建隐蔽信道的理想平台。首先,简要介绍了区块链技术,对隐蔽信道的发展历程进行了阐述,并对隐蔽信道现有的分类方式进行了研究和总结;然后,在传统网络隐蔽信道的基础上总结了区块链隐蔽信道的一般模型,将隐蔽信道的构建过程划分为信息传输和信息提取两个主要环节;接着,从区块链的六层架构出发,对区块链隐蔽信道进行了深入分析,按照不同的层次将区块链隐蔽信道分为了六大类,并依据每层的结构和机制进行细分,能够更好地理解区块链隐蔽信道的构建过程,挖掘潜在的隐蔽信道;最后,讨论了区块链技术给隐蔽信道带来的局限性,并提出了未来的研究方向。 展开更多
关键词 区块链 隐蔽信道 隐蔽信道分类 信息传输 信息提取
在线阅读 下载PDF
处理器时间侧信道攻防技术综述
18
作者 唐博文 武成岗 王喆 《高技术通讯》 CAS 北大核心 2024年第5期439-452,共14页
现代处理器优化机制众多,设计人员在追求性能提升时,往往忽略背后的安全风险。时间侧信道攻击因其影响面广且隐蔽性好已成为最主要的安全威胁之一。随着瞬态执行攻击的出现,时间侧信道攻击的能力被进一步扩展,计算系统的安全基础被动摇... 现代处理器优化机制众多,设计人员在追求性能提升时,往往忽略背后的安全风险。时间侧信道攻击因其影响面广且隐蔽性好已成为最主要的安全威胁之一。随着瞬态执行攻击的出现,时间侧信道攻击的能力被进一步扩展,计算系统的安全基础被动摇。为此,处理器厂商及安全人员提出了大量防御机制。这些机制具有不同的防护能力及性能开销。与此同时,新的瞬态执行漏洞和隐蔽信道也不断被发现,已提出的防御机制被不断突破。围绕处理器时间侧信道攻防技术的博弈日益激烈。本文从基本攻击原理出发,对现有时间侧信道攻击进行了归纳总结,并在此基础上进一步分析了相关防御机制的保护能力和性能瓶颈,从而梳理出时间侧信道攻防技术的发展趋势,为未来软硬件系统开发和安全技术探索提供参考。 展开更多
关键词 处理器微架构 时间侧信道攻击 隐蔽信道 瞬态执行攻击 投机执行 防御技术
在线阅读 下载PDF
基于多通道卷积和注意力网络的DNS隐蔽信道检测算法 被引量:1
19
作者 李晓冬 张映敏 +1 位作者 李育强 刘仁婷 《科学技术与工程》 北大核心 2024年第35期15137-15144,共8页
域名系统(domain name system,DNS)隐蔽信道是一种利用DNS协议实现数据泄露的网络攻击手段,受到诸多高级持续性威胁(advanced persistent threat,APT)组织的青睐,给网络空间安全带来了严重威胁。针对传统机器学习方法对特征依赖性强、... 域名系统(domain name system,DNS)隐蔽信道是一种利用DNS协议实现数据泄露的网络攻击手段,受到诸多高级持续性威胁(advanced persistent threat,APT)组织的青睐,给网络空间安全带来了严重威胁。针对传统机器学习方法对特征依赖性强、误报率高的问题,提出一种融合多通道卷积和注意力网络的DNS隐蔽信道检测算法。该算法基于DNS请求与响应双向流,首先将残差结构和并行卷积相结合,采用不同大小的卷积核提取并融合多尺度特征信息,实现不同感受野特征的捕获;其次引入通道注意力机制增加卷积通道关键信息的提取能力,丰富网络模型的表达能力;最后采用softmax函数实现DNS隐蔽信道的检测。实验结果表明,所提模型能有效检测DNS隐蔽信道,平均准确率、精确率和召回率分别为96.42%、97.82%和96.16%,优于传统方法。 展开更多
关键词 DNS隐蔽信道 流量检测 卷积神经网络 注意力机制
在线阅读 下载PDF
网络隐蔽通道构建关键技术研究综述 被引量:2
20
作者 田婧 段梦军 +3 位作者 汪明达 魏嘉男 何川 张翔 《通信技术》 2024年第8期757-768,共12页
网络隐蔽通道是指在网络环境下用于传输秘密信息的通道。传统网络隐蔽通道的构建主要基于信息内容隐写技术,而目前该领域的研究正逐渐转向通过隐蔽网络通信架构完成隐蔽传输。梳理了当前网络隐蔽通道构建研究领域的主流技术,总结了各网... 网络隐蔽通道是指在网络环境下用于传输秘密信息的通道。传统网络隐蔽通道的构建主要基于信息内容隐写技术,而目前该领域的研究正逐渐转向通过隐蔽网络通信架构完成隐蔽传输。梳理了当前网络隐蔽通道构建研究领域的主流技术,总结了各网络层次隐蔽通道的构建技术,介绍了新型网络隐蔽通道,包括流媒体、区块链和IPv6,填补了现有工作的空白,为随后在这些新网络环境中设计隐蔽通道提供了研究思路。最后,提出了隐蔽通道构建面临的主要挑战,一是封锁技术降低了通道的可用性,二是使用机器学习和深度学习技术使得隐蔽通道更易被攻击,并指出了技术上的解决方向。 展开更多
关键词 网络隐蔽通道 信息内容隐写技术 新型网络隐蔽通道 隐蔽通道构建
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部