期刊文献+
共找到304篇文章
< 1 2 16 >
每页显示 20 50 100
Integrated criteria for covert channel auditing
1
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 Multilevel security covert channel covert channel auditing
在线阅读 下载PDF
Detecting DNS Covert Channels Using Stacking Model 被引量:2
2
作者 Peng Yang Ye Li Yunze Zang 《China Communications》 SCIE CSCD 2020年第10期183-194,共12页
A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS co... A covert channel is an information channel that is used by the computer process to exfiltrate data through bypassing security policies.The DNS protocol is one of the important ways to implement a covert channel.DNS covert channels are easily used by attackers for malicious purposes.Therefore,an effective detection approach of the DNS covert channels is significant for computer systems and network securities.Aiming at the difficulty of the DNS covert channel identification,we propose a DNS covert channel detection method based on a stacking model.The stacking model is evaluated on a campus network and the experimental results show that the detection based on the stacking model can detect the DNS covert channels effectively.Besides,it can identify unknown covert channel traffic.The area under the curve(AUC)of the proposed method reaches 0.9901,which outperforms existing detection methods. 展开更多
关键词 DNS covert channel stacking model
在线阅读 下载PDF
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
3
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between vip and virtual machine monitor to pass data directly. The vip machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 VIRTUALIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
Analysis and Application of Covert Channels of Internet Control Message Protocol
4
作者 ZHOU Xueguang ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1857-1861,共5页
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert cha... Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 展开更多
关键词 internet control message protocol (ICMP) covert channel embedded Internet terminal (EIT) algorithm information security
在线阅读 下载PDF
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
5
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期547-553,共7页
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail. 展开更多
关键词 quantum information hiding quantum covert channel quantum cryptography quantum communication
原文传递
A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
6
作者 Lejun Zhang Xiaoyan Hu +5 位作者 Zhijie Zhang Weizheng Wang Tianwen Huang Donghai Guan Chunhui Zhao Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2020年第9期2013-2030,共18页
Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect c... Covert channel of the packet ordering is a hot research topic.Encryption technology is not enough to protect the security of both sides of communication.Covert channel needs to hide the transmission data and protect content of communication.The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator.However,because the establishment of proxy communication needs to consume traffic,the communication capacity will be reduced,and in recent years,the tor technology often has vulnerabilities that led to the leakage of secret information.In this paper,the covert channel model of the packet ordering is applied into the distributed system,and a distributed covert channel of the packet ordering enhancement model based on data compression(DCCPOEDC)is proposed.The data compression algorithms are used to reduce the amount of data and transmission time.The distributed system and data compression algorithms can weaken the hidden statistical probability of information.Furthermore,they can enhance the unknowability of the data and weaken the time distribution characteristics of the data packets.This paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity,transmission efficiency,and transmission performance.According to the analysis results,it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering,which saves the transmission time and improves the concealment compared with the original covert channel. 展开更多
关键词 covert channels information hiding data compression distributed system
在线阅读 下载PDF
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
7
作者 Xiao-Hang Wang Shou-Bin Li +5 位作者 Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第4期396-415,共20页
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signa... When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then transmitted.The receiver at the other end picks up the sound signal,from which the original sensitive data can be recovered.As a forceful countermeasure against the ISCC attack,strong noise can be used to jam the channel and literally shut down any possible sound data transmission.In this paper,enhanced ISCC is proposed,whose transmission frequency can be dynamically changed.Essentially,if the transmitter detects that the covert channel is being jammed,the transmitter and receiver both will switch to another available frequency and re-establish their communications,following the proposed communications protocol.Experimental results show that the proposed enhanced ISCC can remain connected even in the presence of a strong jamming noise source.Correspondingly,a detection method based on frequency scanning is proposed to help to combat such an anti-jamming sound channel.With the proposed countermeasure,the bit error rate(BER)of the data communications over enhanced ISCC soars to more than 48%,essentially shutting down the data transmission,and thus neutralizing the security threat. 展开更多
关键词 COUNTERMEASURE inaudible sound covert channel(ISCC)
在线阅读 下载PDF
Auditing the Use of DBMS Covert Storage Channels Relevant with Transactions
8
作者 朱虹 FENG +2 位作者 Yucai Zhou Chun 《High Technology Letters》 EI CAS 2002年第1期17-22,共6页
This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next... This paper proposes the concept of transaction-type covert storage channels, which are caused by database storage resources. It also proposes that the mode of auditing those channels be based on the transactions. Next, the paper analyzes and resolves the two problems arising from auditing the use of transaction-type covert storage channels in database systems: namely, the relationship between channel variables, which are altered (or viewed) by the transaction and satisfy integrity constraints in DBMS, and database states; and the circumvention of covert storage channel audit in DBMS. 展开更多
关键词 covert storage channels AUDIT Transaction Integrity constraint Circumvention of audit
在线阅读 下载PDF
LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing
9
作者 Omar Darwish Shorouq Al-Eidi +4 位作者 Abdallah Al-Shorman Majdi Maabreh Anas Alsobeh Plamen Zahariev Yahya Tashtoush 《Computers, Materials & Continua》 2026年第1期2231-2251,共21页
Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remain... Covert timing channels(CTC)exploit network resources to establish hidden communication pathways,posing signi cant risks to data security and policy compliance.erefore,detecting such hidden and dangerous threats remains one of the security challenges. is paper proposes LinguTimeX,a new framework that combines natural language processing with arti cial intelligence,along with explainable Arti cial Intelligence(AI)not only to detect CTC but also to provide insights into the decision process.LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely.LinguTimeX demonstrates strong e ectiveness in detecting CTC across multiple languages;namely English,Arabic,and Chinese.Speci cally,the LSTM and RNN models achieved F1 scores of 90%on the English dataset,89%on the Arabic dataset,and 88%on the Chinese dataset,showcasing their superior performance and ability to generalize across multiple languages. is highlights their robustness in detecting CTCs within security systems,regardless of the language or cultural context of the data.In contrast,the DeepForest model produced F1-scores ranging from 86%to 87%across the same datasets,further con rming its e ectiveness in CTC detection.Although other algorithms also showed reasonable accuracy,the LSTM and RNN models consistently outperformed them in multilingual settings,suggesting that deep learning models might be better suited for this particular problem. 展开更多
关键词 Arabic language Chinese language covert timing channel CYBERSECURITY deep learning English language language processing machine learning
在线阅读 下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
10
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 covert channel TIMING channel INTRUSION Detection VIRTUALIZATION Software-Defined Network
在线阅读 下载PDF
Arm架构的分支预测器隐蔽信道研究
11
作者 杨毅 吴凭飞 +7 位作者 邱朋飞 王春露 赵路坦 张锋巍 王博 吕勇强 王海霞 汪东升 《信息安全学报》 2025年第1期1-16,共16页
隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介... 隐蔽信道是一种在不违背计算机当前安全策略的前提下,在进程间传递信息的攻击方式。共两个进程参与到隐蔽信道的构建中:木马进程和间谍进程,具有高权限的木马进程通过隐蔽信道向低权限的间谍进程传递信息以完成攻击。隐蔽信道的传输介质种类很多,如时间、功耗、温度等。在现代处理器中,分支预测器作为重要的微架构组件,有效提高了处理器的流水线效率,但由于分支预测器在核内的多进程间共享,使得其存在被用于构建隐蔽信道的风险。目前Intel x86架构已被发现存在基于分支预测器的隐蔽信道攻击,但是Arm架构是否存在相似的攻击还没有得到充分的研究。本文中,我们成功在Arm架构的实际硬件平台上构建了三种基于分支预测器的隐蔽信道。首先我们在Arm架构下设计并实现了类似于x86架构下的基于分支预测器的隐蔽信道CC和RSC,其次我们发现了一个新的基于分支预测组件BTB的隐蔽信道BTBC。我们评估并分析了隐蔽信道参数对信道性能的影响及其成因,并给出参数设置建议。在Cortex-A53及Cortex-A72两种核心上,我们对三种隐蔽信道的信号特性、传输速率和误码率进行了测试和对比分析。实验表明在实际的Arm架构硬件平台下,BTBC的传输信号边缘清晰,震荡幅度小。在连续传输数据时表现出与CC和RSC近似的信道性能,并且在两种核心上均可以低误码率进行数据传输,其在200bps的传输速率下,仅有2%的误码率。最后我们还给出了对于此类隐蔽信道的防御措施。 展开更多
关键词 ARM架构 分支预测器 隐蔽信道
在线阅读 下载PDF
低空智融网络可靠传输基础研究
12
作者 张雪 邓君 +2 位作者 刘明远 张宇明 张宏科 《河南科技大学学报(自然科学版)》 北大核心 2025年第4期1-7,M0002,共8页
低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合... 低空智联网是推动低空经济和空中交通智能化的核心驱动力。然而,当前低空智联网的通信技术仍面临协同能力弱与传输可靠性不足等突出问题,严重制约了其在复杂弱网场景下的业务支撑能力。针对上述挑战,提出低空智融通信架构,纵向分为融合网络层、资源适配层与低空服务层3层,并设计跨网协同传输、多径灵活调度、编码冗余增强以及隐蔽信道传输等核心技术,旨在通过架构创新与技术融合,全面提升低空智联网的传输效率与可靠保障能力。实验结果表明,所提方案有效传输速率较单路传输提升至少1倍,网络编码译码成功率较传统方法平均提升11.05%,隐蔽信道传输正确率较传统算法提升了至少10%。 展开更多
关键词 低空智联网 跨网协同 多径传输 网络编码 隐蔽信道
在线阅读 下载PDF
时间型网络隐蔽信道检测技术分析
13
作者 肖尧 周建群 《工业信息安全》 2025年第5期28-36,共9页
随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生... 随着通信网络技术的迭代演进,新型网络安全威胁也随之诞生,保护用户的隐私安全是网络安全建设中不可或缺的一环。时间型网络隐蔽信道凭借其良好的隐蔽性,能够在高级持续性威胁攻击中实现窃取用户信息而不被发现,对关键信息基础设施产生了严重威胁。因此,检测并发现流量中存在的时间型网络隐蔽信道已成为提高网络空间安全防御能力的关键一环。本文针对时间型网络隐蔽信道检测技术,系统阐述网络隐蔽信道的基本定义及其构建技术的发展现状,在此基础上,重点解析传统时间型隐蔽信道检测方案的技术原理与应用局限,并详细考察分析了近三年基于机器学习的检测方案。文章进一步结合时间型隐蔽信道构造技术的演进规律,提出检测技术未来发展的潜在方向。 展开更多
关键词 时间型网络隐蔽信道 时间型网络隐蔽信道检测 机器学习 网络安全
在线阅读 下载PDF
基于压缩感知多址接入的网络通信隐蔽传输信道估计方法
14
作者 江雍 《自动化技术与应用》 2025年第12期155-158,共4页
由于隐蔽信道具有稀疏性,在对隐蔽传输信道估计时,可能会因缺乏对关键信息的有效提取而导致信道估计效果不佳,故基于压缩感知多址接入研究网络通信隐蔽传输信道估计方法。引入稀疏字典,通过对稀疏系数向量求解,提取出信道冲激响应中的... 由于隐蔽信道具有稀疏性,在对隐蔽传输信道估计时,可能会因缺乏对关键信息的有效提取而导致信道估计效果不佳,故基于压缩感知多址接入研究网络通信隐蔽传输信道估计方法。引入稀疏字典,通过对稀疏系数向量求解,提取出信道冲激响应中的关键信息。采用测量矩阵对信道冲激响应线性投影,得到用户的压缩感知值。结合正交匹配追踪法,以迭代的方式对测量矩阵中与当前残差最相关的列选择,实现对隐蔽传输信道估计。实验结果表明,采用所提方法对隐蔽传输信道进行估计时,误码率较低,具备较为理想的估计效果。 展开更多
关键词 压缩感知 多址接入 隐蔽信道 信道估计 误码率
在线阅读 下载PDF
APT攻击中隐蔽通信信道的多维度检测模型构建
15
作者 谭金臻 方娜 《办公自动化》 2025年第15期96-98,共3页
文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模... 文章提出一种多维度检测模型TCDM,通过融合流量行为、协议语义与载荷特征实现立体化威胁识别。模型采用LSTM网络与ARIMA算法捕捉时序异常,结合DNS查询熵、TLS指纹匹配及滑动窗口熵值分析协议与载荷特征,并引入动态权重分配机制优化多模态决策。实验基于扩展CICIDS2017数据集验证,TCDM在DNS隧道、HTTPS隐蔽通道及ICMP传输检测中分别达到98.7%、95.1%与93.4%的准确率,误报率低至2.8%,AUC值达0.9745,较传统方法显著提升。其流式处理引擎支持15ms级实时检测,并在实际部署中成功阻断供应链攻击,表明模型兼具理论先进性与工程实用性,为APT防御提供新范式。 展开更多
关键词 APT攻击 隐蔽通信 隐蔽信道检测 多维度检测
在线阅读 下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
16
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
在线阅读 下载PDF
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
17
作者 王翀 陈荣亮 古亮 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第4期793-806,共14页
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries amo... With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries among the application data are very thin,and the potential of data leakage exists all the time.For instance,a virtual machine covert timing channel is an aggressive mechanism to leak confidential information through shared components or networks by violating isolation and security policies in practice.The performance of a covert timing channel(covert channel)is crucial to adversaries and attempts have been made to improve the performance of covert timing channels by advancing the encoding mechanism and covert information carriers.Though promising,the redundancy of the covert message is mainly overlooked.This paper applies three encoding schemes namely run-length,Huffman,and arithmetic encoding schemes for data compression of a virtual machine covert timing channel by exploiting redundancy.Accordingly,the paper studies the performance of such channels according to their capacity.Unfortunately,we show that these encoding schemes still contain redundancy in a covert channel scenario,and thereby a new encoding scheme namely optimized Runlength encoding(OptRLE)is presented that greatly enhances the performance of a covert timing channel.Several optimizations schemes adopted by OptRLE are also discussed,and a mathematical model of the behavior of an OptRLE-based covert timing channel is proposed.The theoretical capacity of a channel can be obtained using the proposed model.Our analysis reveals that OptRLE further improves the performance of a covert timing channel,in addition to the effects of the optimizations.Experimental result shows how OptRLE affects the size of covert data and the capacity of covert timing channels,and why the performance of the covert timing channel is improved. 展开更多
关键词 covert storage channel information security covert channel threat evaluation anti-detection criterion covert channel restriction
原文传递
隐蔽信道研究 被引量:48
18
作者 王永吉 吴敬征 +2 位作者 曾海涛 丁丽萍 廖晓锋 《软件学报》 EI CSCD 北大核心 2010年第9期2262-2288,共27页
隐蔽信道是指允许进程以危害系统安全策略的方式传输信息的通信信道,是对安全信息系统的重要威胁,并普遍存在于安全操作系统、安全网络、安全数据库系统中.国内外的安全标准都要求对高等级的安全信息系统进行隐蔽信道分析.首先分析隐蔽... 隐蔽信道是指允许进程以危害系统安全策略的方式传输信息的通信信道,是对安全信息系统的重要威胁,并普遍存在于安全操作系统、安全网络、安全数据库系统中.国内外的安全标准都要求对高等级的安全信息系统进行隐蔽信道分析.首先分析隐蔽信道的基本概念,研究领域、技术组成及分类,然后从信道识别、度量、消除、限制、审计和检测几个技术层面综述隐蔽信道研究中经典的技术和方法,系统地总结隐蔽信道领域30多年来的研究成果,尤其对近年来隐蔽信道度量和处置新技术作了较为详尽的介绍.试图为该研究方向勾画出一个较为全面和清晰的概貌,为隐蔽信道分析领域的研究者提供有益的参考. 展开更多
关键词 隐蔽信道 隐蔽信道识别 隐蔽信道度量 隐蔽信道消除 隐蔽信道限制 隐蔽信道审计 隐蔽信道检测
在线阅读 下载PDF
网络隐蔽信道关键技术研究综述 被引量:27
19
作者 李彦峰 丁丽萍 +4 位作者 吴敬征 崔强 刘雪花 关贝 王永吉 《软件学报》 EI CSCD 北大核心 2019年第8期2470-2490,共21页
网络隐蔽信道是在网络环境下违反通信限制规则进行隐蔽信息传输的信息通道,为网络信息安全带来了新的挑战,也为数据传输的安全性和隐私性带来了新的研究方向.首先介绍了网络隐蔽信道的定义、分类、能力维度等基本概念;进而从码元设计、... 网络隐蔽信道是在网络环境下违反通信限制规则进行隐蔽信息传输的信息通道,为网络信息安全带来了新的挑战,也为数据传输的安全性和隐私性带来了新的研究方向.首先介绍了网络隐蔽信道的定义、分类、能力维度等基本概念;进而从码元设计、信息编码和信道优化这3个方面归纳分析了存储型和时间型两类网络隐蔽信道的构建技术,从隐蔽性、鲁棒性和传输效率这3个方面总结了网络隐蔽信道评估方法,从消除、限制、检测这3个方面梳理了网络隐蔽信道的对抗技术;最后,对未来的研究方向进行了展望. 展开更多
关键词 网络隐蔽信道 信息隐藏 网络隐蔽信道构建 网络隐蔽信道对抗
在线阅读 下载PDF
隐蔽信道新型分类方法与威胁限制策略 被引量:12
20
作者 王翀 王秀利 +4 位作者 吕荫润 张常有 吴敬征 关贝 王永吉 《软件学报》 EI CSCD 北大核心 2020年第1期228-245,共18页
隐蔽信道是指恶意通信双方通过修改共享资源的数值、特性或状态等属性,来编码和传递信息的信道.共享资源的选取,由隐蔽信道的类型与具体通信场景所决定.早期,存储隐蔽信道和时间隐蔽信道主要存在于传统操作系统、网络和数据库等信息系统... 隐蔽信道是指恶意通信双方通过修改共享资源的数值、特性或状态等属性,来编码和传递信息的信道.共享资源的选取,由隐蔽信道的类型与具体通信场景所决定.早期,存储隐蔽信道和时间隐蔽信道主要存在于传统操作系统、网络和数据库等信息系统中.近年来,研究重点逐渐拓展到了3类新型隐蔽信道,分别为混合隐蔽信道、行为隐蔽信道和气隙隐蔽信道.对近年来国内外隐蔽信道研究工作进行了系统的梳理、分析和总结.首先,阐述隐蔽信道的相关定义、发展历史、关键要素和分析工作.然后,根据隐蔽信道共享资源的类型以及信道特征,提出新的隐蔽信道分类体系.首次从发送方、接收方、共享资源、编码机制、同步机制、评价指标和限制方法这7个方面,对近年来新型隐蔽信道攻击技术进行系统的分析和归纳,旨在为后续隐蔽信道分析和限制等研究工作提供有益的参考.进而,讨论了面向隐蔽信道类型的威胁限制技术,为设计面向一类隐蔽信道的限制策略提供研究思路.最后,总结了隐蔽信道中存在的问题和挑战. 展开更多
关键词 隐蔽通信 隐蔽信道 隐蔽信道分类 信息隐藏 行为隐蔽信道
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部