|Table of Contents|

Network Steganography System Based on Multi-Agent

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2009年03期
Page:
302-306
Research Field:
Publishing date:

Info

Title:
Network Steganography System Based on Multi-Agent
Author(s):
QIAN Yu-wenWANG FeiKONG Jian-shouWANG Zhi-quan
School of Automation,NUST,Nanjing 210094,China
Keywords:
networks security of data multi-Agent systems Agent steganography covert channel
PACS:
TP393.08
DOI:
-
Abstract:
A model of multi-Agent collaboration way to hide information based on m-serial is presented to protect security of network information.Capacity,robustness and security are proposed to evaluate the performance of network steganography system.According to the mode,a network steganography system is developed.The system strengthens the robustness of steganography by multi-Agent cooperation,sends information by multi-Agent,and the capacity of covert communication is increased.Simulation results show that the hiding information is not lost because the network steganography algorithms do not deal with the special bits of network packet,so that it is not interfered by the fire wall;impact of the security products like firewall on the security of hiding imformation is very large for those algorithms which hide imformation by filling special bit of network packet,but these products play little role on the network steganography system.

References:

[ 1] 茅耀斌, 戴跃伟, 王执铨. 一种基于Baker 映射的图像信息隐藏方法[ J]. 南京理工大学学报( 自然科学版), 2002, 26( 2): 152- 156.
[ 2] Ahsan K, Kundur D. Practica l data h iding in TCP / IP [ A ]. ACM WKSP M ultim edia [ C ]. Juan- les-P ins, France: ACM, 2002. 7- 14.
[ 3] C au ich E, GardenasR G, W atanabeR. Data hiding in identification and offset IP fie lds[ A ]. Proceed ing of 5th Interna tiona l Schoo l and Symposium, ISSADS 2005 [ C ]. Guada lajara, M ex ico: Springer, 2005. 118 - 125.
[ 4] G irling C G. Covert channels in LAN. s [ J]. IEEE T ransactions on Softw are Eng ineer ing, 1987, 13( 2): 292- 296.
[ 5] 徐杰峰. 基于TCP / IP协议的网络隐蔽通道研究 [ J]. 北京邮电大学学报, 2003, 6( 26): 122- 126.
[ 6] 马祺,戴浩, 赵新昱, 等. 运用跳端口技术进行信息隐藏[ J]. 计算机工程与设计, 2007, 28( 4): 859- 851.
[ 7] 汤惟. 若干伪随机序列构造及其在信息隐藏中的应用[ J] . 江汉大学学报, 2003, 3( 3): 34- 36.
[ 8] 王会华, 李宝平. m-序列发生器的设计与实现[ J]. 北京电子科技学院学报, 2007, 15( 2): 58- 61.
[ 9] 刘向军, 刘世平, 张洁, 等. 多Agen t系统通信与协作机制构造[ J]. 机械设计与制造工程, 2002, 31 ( 2): 40- 42.
[ 10] 李明欣, 佘堃. 基于NDIS 中间驱动的入侵检测 [ J]. 计算机工程与设计, 2007, 28( 1): 51- 53.
[ 11] C abuk S, Brodley C E, Sh ields C. IP covert tim ing channe ls: Design and detection[ A]. ACM Conference on Com puter and Communications Security[ C]. W ashington, USA: ACM, 2004. 178- 187.

Memo

Memo:
-
Last Update: 2012-11-19