[1]钱玉文,宋华菊,张彤芳,等.一种网络协同隐蔽时间信道模型[J].南京理工大学学报(自然科学版),2013,37(05):741.
 Qian Yuwen,Song Huaju,Zhang Tongfang,et al.Model of synergetic network covert timing channel[J].Journal of Nanjing University of Science and Technology,2013,37(05):741.
点击复制

一种网络协同隐蔽时间信道模型
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
37卷
期数:
2013年05期
页码:
741
栏目:
出版日期:
2013-10-31

文章信息/Info

Title:
Model of synergetic network covert timing channel
作者:
钱玉文1宋华菊2张彤芳1唐 弈1
1.南京理工大学 电子工程与光电技术学院,江苏 南京 210094; 2.南京晓庄学院,江苏 南京 210011
Author(s):
Qian Yuwen1Song Huaju2Zhang Tongfang1Tang Yi1
1.School of Electronic Engineering and Optoelectronic Technology,NUST,Nanjing 210094,China; 2.Nanjing Xiaozhuang University,Nanjing 210011,China
关键词:
计算机网络 网络安全 隐写 隐蔽时间信道 鲁棒性
Keywords:
computer network network security steganography covert timing channel robustness
分类号:
TP393.08
文献标志码:
A
摘要:
为解决传统网络隐蔽时间信道传输效率低、不可靠等问题,提出一种由多个计算节点协作完成网络信息隐藏的协同隐蔽时间信道(SCTC)模型。在该模型中,采用简单、可靠的同步机制,协调多个网络节点可靠地协同发送隐蔽信息。通过理论分析可知这种信道的效率比传统隐蔽信息的效率高。设计了可靠的、抗干扰的同步协议,确保了隐蔽信道的可靠性。采用了透明的隐蔽信息嵌入法,方便用户使用。为了进一步了解该信道的性能,对SCTC的传输效率、鲁棒性进行了仿真实验。实验结果表明,SCTC的传输效率是传统隐蔽时间信道的2.6倍,其抗检测性和鲁棒性更优。
Abstract:
In order to solve the problem that the traditional network synergetic covert timing channel is unstable and unefficient,the model of synergetic covert timing channel(SCTC)is proposed to send the covert information by several computers collaborated with each other.A reliable communication protocol synchronizing the transmitter and the receiver is designed to ensure the stability of SCTC.To improve the convenience of the covert channel,the covert information is embedded in a transparent way,and the coding scheme of “2-bits to one inter packets delay” is adopted.The results of covert communicate experiments show that,the transmission efficiency of SCTC is about 2.6 times of that of the traditional timing channel,and it has better robustness and the undetectability.

参考文献/References:

[1] Butler Lampson.A note on the confinement problem[J].Communications of the ACM,1973,16(10):613-115.
[2]Alex Snoeren,Craig Partridge,Luis Sanchez,et.al.Single Packet IP Trace back[J].ACM/IEEE Transaction on Networking,2002,10(6):721-734.
[3]Sebastian Zander,Grenville Armitage,Phillip Branch.A Survey of covert channels and Countermeasures in computer network protocols[J].IEEE Communications Surveys and Tutorials,2007,9(3):44-57.
[4]王永吉,吴敬征,曾海涛,等.隐蔽信道研究[J].软件学报,2010,21(9):2263-2288.
Wang Yongji,Wu Jingzheng,Zeng Haitao,et al.Covert channel research[J].Journal of Software,2010,21(9):2263-2288.
[5]Sarah sellke,Wang Chihchun,Saurabh bagchi,et al.Covert TCP/IP timing channels:Theory to implementation[A].Proceedings of Infocom[C].Riode Janeiro,Brazil:ACM,2009:2204-2212.
[6]Sendar Cabuk,Carla Brodley,Clay Shields.IP covert channel detection[J].Transactions on Information and System Security of ACM,2009:12(4)22:1-22:27.
[7]Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays(Technical Report TR536)[R].Hanover,USA:Department of Computer Science,Dartmouth College,2005.
[8]Gaurav Shah,Andres Molina,Matt Blaze.Keyboards and covert channels[A].USENIX Security Symposium[C].Vancouver,Canada:USENIX Association,2006:59-75.
[9]钱玉文,王飞,孔建寿,等 基于多智能体的网络信息隐藏系统研究[J].南京理工大学学报,2009,33(3):302-305.
Qian Yuwen,Wang Fei,Kong Jianshou,et al.Network steganography system based on multi-agent[J].Journal of Nanjing University of Science and Technology,2009,33(3):302-305.
[10]钱玉文,赵邦信,孔建寿,等.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(11):423-431.
Qian Yuwen,Zhao Bangxin,Kong Jianshou,et al.Robust covert timing channel based on Web[J].Journal of Computer Research and Development,2011,48(11):423-431.
[11]Ira Moskowitz,Myong Kang.Covert channels here to Stay?[A].Proceedings of the Ninth Annual Conference on Computer Assurance[C].Gaithersburg,USA:National Institute of Standards and Technology,1994:235-243.
[12]Wang Xinyuan,Douglas Reeves.Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays[A].Proceedings of the 2003 ACM Conference on Computer and Communications Security[C].Washington,DC,USA:ACM,2003:20-29.
[13]Steven Gianvecchio,Haining Wang.Detecting covert timing channels:An entropy based approach[A].Proceedings of ACM Conference on Computer and Communications Security[J].Alexandria,USA:ACM,2007:307-316.

相似文献/References:

[1]汪峥,钱焕延,汪婧雅,等.基于速度分治的车载物联网良性蠕虫模型[J].南京理工大学学报(自然科学版),2012,36(01):43.
 WANG Zheng,QIAN Huan-yan,WANG Jing-ya,et al.New Anti-worm Model in Vehicular Internet of Things Based on Divide-and-conquer with Velocity[J].Journal of Nanjing University of Science and Technology,2012,36(05):43.
[2]王飞,钱玉文,王执铨,等.基于无监督聚类算法的入侵检测[J].南京理工大学学报(自然科学版),2009,(03):288.
 WANG Fei,QIAN Yu-wen,WANG Zhi-quan.Intrusion Detection Based on Unsupervised Clustering Algorithm[J].Journal of Nanjing University of Science and Technology,2009,(05):288.
[3]徐延贵,等.MIPv6网络中蠕虫传播模型的构建与仿真[J].南京理工大学学报(自然科学版),2009,(06):839.
 XU Yan-gui,QIAN Huan-yan,DU Hong-jun.Construction and Simulation of Worm Propagation Model in MIPv6 Networks[J].Journal of Nanjing University of Science and Technology,2009,(05):839.
[4]朱保平.基于配对函数的对称加密算法[J].南京理工大学学报(自然科学版),2003,(06):696.
 Zhu Baoping.Symmetric Encryption Algorithm Based on Pairing Function[J].Journal of Nanjing University of Science and Technology,2003,(05):696.
[5]张琨,徐永红,王珩,等.基于免疫学的入侵检测系统模型[J].南京理工大学学报(自然科学版),2002,(04):337.
 ZhangKun XuYonghong WangHeng LiuFengyu.Model of Intrusion Detection System Based on Immunology[J].Journal of Nanjing University of Science and Technology,2002,(05):337.
[6]徐永红,张琨,杨云,等.Smurf攻击及其对策研究[J].南京理工大学学报(自然科学版),2002,(05):512.
 XuYonghong ZhangKun YangYun LiuFengyu.A Study on Smurf Attack and Its Countermeasures[J].Journal of Nanjing University of Science and Technology,2002,(05):512.
[7]赵建,李蔚清,杨秋昊.异构网络互连及其实时通信的研究与实现[J].南京理工大学学报(自然科学版),2000,(06):498.
 ZhaoJian LiWeiqing YangQiuhao.Implementation of Real-time Communication on Heterogeneous Networks[J].Journal of Nanjing University of Science and Technology,2000,(05):498.
[8]朱保平,赵建.企业网中PBX的分析与研究[J].南京理工大学学报(自然科学版),1999,(06):573.
 ZhuBaoping ZhaoJian.Analysis and Research on PBX in the Enterprise Network[J].Journal of Nanjing University of Science and Technology,1999,(05):573.
[9]王卫斌,孙吉振.一种网络协议一致性测试生成方法的改进[J].南京理工大学学报(自然科学版),1998,(03):24.
 Wang Weibin Sun Jizhen.An Improved Method for Network Protocol Conformance Test Generation[J].Journal of Nanjing University of Science and Technology,1998,(05):24.
[10]唐洪宝,郭晓丹,孙亚民.网络多路接口控制器(NMC)性能分析[J].南京理工大学学报(自然科学版),1997,(02):69.
 Tang Hongbao Guo xiaodan Sun Yamin.Performance Analysis of Network Multi interface Controller(NMC)[J].Journal of Nanjing University of Science and Technology,1997,(05):69.

备注/Memo

备注/Memo:
收稿日期:2012-05-12 修回日期:2012-09-19
基金项目:国家自然科学基金(60974129; 70931002); 江苏省自然科学基金(BK2009388)
作者简介:钱玉文(1975-),男,博士,讲师,主要研究方向:网络安全,信息隐藏等,E-mail:admon1999@163.com。
更新日期/Last Update: 2013-10-31