期刊文献+
共找到307篇文章
< 1 2 16 >
每页显示 20 50 100
Integrated criteria for covert channel auditing
1
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security covert channel covert channel auditing
在线阅读 下载PDF
Detecting DNS Covert Channels Using Stacking Model 被引量:2
2
作者 Peng Yang Ye Li Yunze Zang 《China Communications》 SCIE CSCD 2020年第10期183-194,共12页
A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS co... A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS covert channels are easily used by attackers for malicious purposes.Therefore,an effective detection approach of the DNS covert channels is significant for computer systems and network securities.Aiming at the difficulty of the DNS covert channel identification,we propose a DNS covert channel detection method based on a stacking model.The stacking model is evaluated on a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively.Besides,it can identify unknown covert channel traffic.The area under the curve(AUC)of the proposed method reaches 0.9901,which outperforms existing detection methods. 展开更多
关键词 DNS covert channel stacking model
在线阅读 下载PDF
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
3
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between vip and virtual machine monitor to pass data directly. The vip machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 VIRTUALIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
Analysis and Application of Covert Channels of Internet Control Message Protocol
4
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded Internet terminal (EIT) algorithm information security
在线阅读 下载PDF
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
5
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
6
作者 Lejun Zhang Xiaoyan Hu +5 位作者 Zhijie Zhang Weizheng Wang Tianwen Huang Donghai Guan Chunhui Zhao Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2020年第9期2013-2030,共18页
Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect c... Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect content of communication.The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator.However,because the establishment of proxy communication needs to consume traffic,the communication capacity will be reduced,and in recent years,the tor technology often has vulnerabilities that led to the leakage of secret information.In this paper,the covert channel model of the packet ordering is applied into the distributed system,and a distributed covert channel of the packet ordering enhancement model based on data compression(DCCPOEDC)is proposed.The data compression algorithms are used to reduce the amount of data and transmission time.The distributed system and data compression algorithms can weaken the hidden statistical probability of information.Furthermore,they can enhance the unknowability of the data and weaken the time distribution characteristics of the data packets.This paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity,transmission efficiency,and transmission performance.According to the analysis results,it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering,which saves the transmission time and improves the concealment compared with the original covert channel. 展开更多
关键词 covert channels information hiding data compression distributed system
在线阅读 下载PDF
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
7
作者 Xiao-Hang Wang Shou-Bin Li +5 位作者 Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第4期396-415,共20页
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signa... When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signal,from which the original sensitive data can be recovered.As a forceful countermeasure against the ISCC attack,strong noise can be used to jam the channel and literally shut down any possible sound data transmission.In this paper,enhanced ISCC is proposed,whose transmission frequency can be dynamically changed.Essentially,if the transmitter detects that the covert channel is being jammed,the transmitter and receiver both will switch to another available frequency and re-establish their communications,following the proposed communications protocol.Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source.Correspondingly,a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel.With the proposed countermeasure,the bit error rate(BER)of the data communications over enhanced ISCC soars to more than 48%,essentially shutting down the data transmission,and thus neutralizing the security threat. 展开更多
关键词 COUNTERMEASURE inaudible sound covert channel(ISCC)
在线阅读 下载PDF
Auditing the Use of DBMS Covert Storage Channels Relevant with Transactions
8
作者 朱虹 FENG +2 位作者 Yucai Zhou Chun 《High Technology Letters》 EI CAS 2002年第1期17-22,共6页
This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next... This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next, the paper analyzes and resolves the two problems arising from auditing the use of transaction-type covert storage channels in database systems: namely, the relationship between channel variables, which are altered (or viewed) by the transaction and satisfy integrity constraints in DBMS, and database states; and the circumvention of covert storage channel audit in DBMS. 展开更多
关键词 covert storage channels AUDIT Transaction Integrity constraint Circumvention of audit
在线阅读 下载PDF
非理想信道条件下面向信息年龄最小化的短包隐蔽通信设计
9
作者 朱开基 马瑞谦 +4 位作者 林志 马越 王勇 管新荣 蔡跃明 《电子与信息学报》 北大核心 2026年第1期67-77,共11页
该文针对短包隐蔽通信场景,考虑信道估计误差导致的非理想信道条件,研究了最小化平均隐蔽信息年龄(CAoI)的通信参数优化问题。具体地,首先推导了非理想信道条件下的隐蔽约束和平均CAoI的闭式表达式;其次,推导了最小化平均CAoI的发送功... 该文针对短包隐蔽通信场景,考虑信道估计误差导致的非理想信道条件,研究了最小化平均隐蔽信息年龄(CAoI)的通信参数优化问题。具体地,首先推导了非理想信道条件下的隐蔽约束和平均CAoI的闭式表达式;其次,推导了最小化平均CAoI的发送功率表达式。在此基础上,进一步基于黄金分割法对导频信号包长和数据信号包长进行优化,以最小化平均CAoI,从而实现通信隐蔽性和时效性之间的最优折中。此外,该文还分析了平均CAoI与收发距离、隐蔽容忍度等参数的变化关系。仿真结果表明,存在最优包长和最优导频信号包长,使得平均CAoI最小,并且与固定包长分配比例的情况相比,所提优化方法可以获得更好的性能。并且当隐蔽性约束更严格时,由于发送功率的降低,最优的导频信号包长随之增大。 展开更多
关键词 隐蔽通信 短包通信 非理想信道 隐蔽信息年龄
在线阅读 下载PDF
CoAP协议隐蔽通道分析及安全建议
10
作者 姬国珍 康荣保 +2 位作者 田学成 孙宁天 张蕾 《网络安全与数据治理》 2026年第2期12-19,共8页
物联网(IoT)设备的快速普及为关键基础设施网络带来了新的安全挑战,利用物联网通信协议中的隐蔽通道泄露敏感数据,实现远程控制对关键基础设施网络产生严重威胁。通过分析物联网CoAP协议隐蔽信道构建方法,并利用协议不同字段构建了多个... 物联网(IoT)设备的快速普及为关键基础设施网络带来了新的安全挑战,利用物联网通信协议中的隐蔽通道泄露敏感数据,实现远程控制对关键基础设施网络产生严重威胁。通过分析物联网CoAP协议隐蔽信道构建方法,并利用协议不同字段构建了多个隐蔽通道。在实验环境中验证了隐蔽通道的隐蔽性带来的安全挑战。该研究揭示了物联网环境下的安全威胁,为物联网的安全防护提供技术支撑。 展开更多
关键词 物联网 隐蔽信道 CoAP协议 安全防护
在线阅读 下载PDF
基于应用程序的隐蔽信道研究综述
11
作者 常慧妍 扈红超 +2 位作者 周大成 许德鹏 程国振 《计算机科学》 北大核心 2026年第3期411-423,共13页
近年来,在安全可信的应用程序所生成的网络信息流中应用隧道实现信息隐蔽,已成为构建隐蔽通信信道的常见技术手段。随着隐蔽信道技术的发展,基于各类不同应用程序的隐蔽信道系统被相继提出,但当前综述多聚焦于深入探讨其技术原理和定义... 近年来,在安全可信的应用程序所生成的网络信息流中应用隧道实现信息隐蔽,已成为构建隐蔽通信信道的常见技术手段。随着隐蔽信道技术的发展,基于各类不同应用程序的隐蔽信道系统被相继提出,但当前综述多聚焦于深入探讨其技术原理和定义,在分类的详细解析上略显不足,并且缺乏对分类依据以及各类系统优缺点的详尽阐述。因此,对基于应用程序的隐蔽信道这一领域进行全面并深入的综述。从底层应用程序角度出发,将其分为多媒体流应用程序型和实时在线游戏型两大类。依据嵌入隐蔽数据所处环节的不同,将基于多媒体流应用程序的隐蔽信道分为在原始多媒体流中嵌入和在压缩多媒体流中嵌入两类方法。此外,通过深入细致地分析各类方法所具备的独特优势及潜在问题,对多种基于多媒体流的隐蔽信道进行多维对比分析,旨在揭示各类隐蔽信道技术的特性与差异。在现有研究的基础上,归纳总结该领域核心挑战并展望未来发展趋势。 展开更多
关键词 隐蔽信道 隐蔽通信 隐写术 隐私安全 网页实时通信
在线阅读 下载PDF
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing
12
作者 Omar Darwish Shorouq Al-Eidi +4 位作者 Abdallah Al-Shorman Majdi Maabreh Anas Alsobeh Plamen Zahariev Yahya Tashtoush 《Computers, Materials & Continua》 2026年第1期2231-2251,共21页
Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remain... Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remains one of the security challenges. is paper proposes LinguTimeX,a new framework that combines natural language processing with arti cial intelligence,along with explainable Arti cial Intelligence(AI)not only to detect CTC but also to provide insights into the decision process.LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely.LinguTimeX demonstrates strong e ectiveness in detecting CTC across multiple languages;namely English,Arabic,and Chinese.Speci cally,the LSTM and RNN models achieved F1 scores of 90%on the English dataset,89%on the Arabic dataset,and 88%on the Chinese dataset,showcasing their superior performance and ability to generalize across multiple languages. is highlights their robustness in detecting CTCs within security systems,regardless of the language or cultural context of the data.In contrast,the DeepForest model produced F1-scores ranging from 86%to 87%across the same datasets,further con rming its e ectiveness in CTC detection.Although other algorithms also showed reasonable accuracy,the LSTM and RNN models consistently outperformed them in multilingual settings,suggesting that deep learning models might be better suited for this particular problem. 展开更多
关键词 Arabic language Chinese language covert timing channel CYBERSECURITY deep learning English language language processing machine learning
在线阅读 下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
13
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 covert channel TIMING channel INTRUSION Detection VIRTUALIZATION Software-Defined Network
在线阅读 下载PDF
低空智融网络可靠传输基础研究 被引量:1
14
作者 张雪 邓君 +2 位作者 刘明远 张宇明 张宏科 《河南科技大学学报(自然科学版)》 北大核心 2025年第4期1-7,M0002,共8页
低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合... 低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合网络层、资源适配层与低空服务层3层,并设计跨网协同传输、多径灵活调度、编码冗余增强以及隐蔽信道传输等核心技术,旨在通过架构创新与技术融合,全面提升低空智联网的传输效率与可靠保障能力。实验结果表明,所提方案有效传输速率较单路传输提升至少1倍,网络编码译码成功率较传统方法平均提升11.05%,隐蔽信道传输正确率较传统算法提升了至少10%。 展开更多
关键词 低空智联网 跨网协同 多径传输 网络编码 隐蔽信道
在线阅读 下载PDF
Arm架构的分支预测器隐蔽信道研究
15
作者 杨毅 吴凭飞 +7 位作者 邱朋飞 王春露 赵路坦 张锋巍 王博 吕勇强 王海霞 汪东升 《信息安全学报》 2025年第1期1-16,共16页
隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介... 隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介质种类很多,如时间、功耗、温度等。在现代处理器中,分支预测器作为重要的微架构组件,有效提高了处理器的流水线效率,但由于分支预测器在核内的多进程间共享,使得其存在被用于构建隐蔽信道的风险。目前Intel x86架构已被发现存在基于分支预测器的隐蔽信道攻击,但是Arm架构是否存在相似的攻击还没有得到充分的研究。本文中,我们成功在Arm架构的实际硬件平台上构建了三种基于分支预测器的隐蔽信道。首先我们在Arm架构下设计并实现了类似于x86架构下的基于分支预测器的隐蔽信道CC和RSC,其次我们发现了一个新的基于分支预测组件BTB的隐蔽信道BTBC。我们评估并分析了隐蔽信道参数对信道性能的影响及其成因,并给出参数设置建议。在Cortex-A53及Cortex-A72两种核心上,我们对三种隐蔽信道的信号特性、传输速率和误码率进行了测试和对比分析。实验表明在实际的Arm架构硬件平台下,BTBC的传输信号边缘清晰,震荡幅度小。在连续传输数据时表现出与CC和RSC近似的信道性能,并且在两种核心上均可以低误码率进行数据传输,其在200bps的传输速率下,仅有2%的误码率。最后我们还给出了对于此类隐蔽信道的防御措施。 展开更多
关键词 ARM架构 分支预测器 隐蔽信道
在线阅读 下载PDF
时间型网络隐蔽信道检测技术分析
16
作者 肖尧 周建群 《工业信息安全》 2025年第5期28-36,共9页
随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生... 随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生了严重威胁。因此,检测并发现流量中存在的时间型网络隐蔽信道已成为提高网络空间安全防御能力的关键一环。本文针对时间型网络隐蔽信道检测技术,系统阐述网络隐蔽信道的基本定义及其构建技术的发展现状,在此基础上,重点解析传统时间型隐蔽信道检测方案的技术原理与应用局限,并详细考察分析了近三年基于机器学习的检测方案。文章进一步结合时间型隐蔽信道构造技术的演进规律,提出检测技术未来发展的潜在方向。 展开更多
关键词 时间型网络隐蔽信道 时间型网络隐蔽信道检测 机器学习 网络安全
在线阅读 下载PDF
基于压缩感知多址接入的网络通信隐蔽传输信道估计方法
17
作者 江雍 《自动化技术与应用》 2025年第12期155-158,共4页
由于隐蔽信道具有稀疏性,在对隐蔽传输信道估计时,可能会因缺乏对关键信息的有效提取而导致信道估计效果不佳,故基于压缩感知多址接入研究网络通信隐蔽传输信道估计方法。引入稀疏字典,通过对稀疏系数向量求解,提取出信道冲激响应中的... 由于隐蔽信道具有稀疏性,在对隐蔽传输信道估计时,可能会因缺乏对关键信息的有效提取而导致信道估计效果不佳,故基于压缩感知多址接入研究网络通信隐蔽传输信道估计方法。引入稀疏字典,通过对稀疏系数向量求解,提取出信道冲激响应中的关键信息。采用测量矩阵对信道冲激响应线性投影,得到用户的压缩感知值。结合正交匹配追踪法,以迭代的方式对测量矩阵中与当前残差最相关的列选择,实现对隐蔽传输信道估计。实验结果表明,采用所提方法对隐蔽传输信道进行估计时,误码率较低,具备较为理想的估计效果。 展开更多
关键词 压缩感知 多址接入 隐蔽信道 信道估计 误码率
在线阅读 下载PDF
APT攻击中隐蔽通信信道的多维度检测模型构建
18
作者 谭金臻 方娜 《办公自动化》 2025年第15期96-98,共3页
文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模... 文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模态决策。实验基于扩展CICIDS2017数据集验证,TCDM在DNS隧道、HTTPS隐蔽通道及ICMP传输检测中分别达到98.7%、95.1%与93.4%的准确率,误报率低至2.8%,AUC值达0.9745,较传统方法显著提升。其流式处理引擎支持15ms级实时检测,并在实际部署中成功阻断供应链攻击,表明模型兼具理论先进性与工程实用性,为APT防御提供新范式。 展开更多
关键词 APT攻击 隐蔽通信 隐蔽信道检测 多维度检测
在线阅读 下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
19
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
在线阅读 下载PDF
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
20
作者 王翀 陈荣亮 古亮 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第4期793-806,共14页
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries amo... With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries among the application data are very thin,and the potential of data leakage exists all the time.For instance,a virtual machine covert timing channel is an aggressive mechanism to leak confidential information through shared components or networks by violating isolation and security policies in practice.The performance of a covert timing channel(covert channel)is crucial to adversaries and attempts have been made to improve the performance of covert timing channels by advancing the encoding mechanism and covert information carriers.Though promising,the redundancy of the covert message is mainly overlooked.This paper applies three encoding schemes namely run-length,Huffman,and arithmetic encoding schemes for data compression of a virtual machine covert timing channel by exploiting redundancy.Accordingly,the paper studies the performance of such channels according to their capacity.Unfortunately,we show that these encoding schemes still contain redundancy in a covert channel scenario,and thereby a new encoding scheme namely optimized Runlength encoding(OptRLE)is presented that greatly enhances the performance of a covert timing channel.Several optimizations schemes adopted by OptRLE are also discussed,and a mathematical model of the behavior of an OptRLE-based covert timing channel is proposed.The theoretical capacity of a channel can be obtained using the proposed model.Our analysis reveals that OptRLE further improves the performance of a covert timing channel,in addition to the effects of the optimizations.Experimental result shows how OptRLE affects the size of covert data and the capacity of covert timing channels,and why the performance of the covert timing channel is improved. 展开更多
关键词 covert storage channel information security covert channel threat evaluation anti-detection criterion covert channel restriction
原文传递
上一页 1 2 16 下一页 到第
使用帮助 返回顶部