参考文献/References:
[1] Butler Lampson.A note on the confinement problem[J].Communications of the ACM,1973,16(10):613-115.
[2]Alex Snoeren,Craig Partridge,Luis Sanchez,et.al.Single Packet IP Trace back[J].ACM/IEEE Transaction on Networking,2002,10(6):721-734.
[3]Sebastian Zander,Grenville Armitage,Phillip Branch.A Survey of covert channels and Countermeasures in computer network protocols[J].IEEE Communications Surveys and Tutorials,2007,9(3):44-57.
[4]王永吉,吴敬征,曾海涛,等.隐蔽信道研究[J].软件学报,2010,21(9):2263-2288.
Wang Yongji,Wu Jingzheng,Zeng Haitao,et al.Covert channel research[J].Journal of Software,2010,21(9):2263-2288.
[5]Sarah sellke,Wang Chihchun,Saurabh bagchi,et al.Covert TCP/IP timing channels:Theory to implementation[A].Proceedings of Infocom[C].Riode Janeiro,Brazil:ACM,2009:2204-2212.
[6]Sendar Cabuk,Carla Brodley,Clay Shields.IP covert channel detection[J].Transactions on Information and System Security of ACM,2009:12(4)22:1-22:27.
[7]Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays(Technical Report TR536)[R].Hanover,USA:Department of Computer Science,Dartmouth College,2005.
[8]Gaurav Shah,Andres Molina,Matt Blaze.Keyboards and covert channels[A].USENIX Security Symposium[C].Vancouver,Canada:USENIX Association,2006:59-75.
[9]钱玉文,王飞,孔建寿,等 基于多智能体的网络信息隐藏系统研究[J].南京理工大学学报,2009,33(3):302-305.
Qian Yuwen,Wang Fei,Kong Jianshou,et al.Network steganography system based on multi-agent[J].Journal of Nanjing University of Science and Technology,2009,33(3):302-305.
[10]钱玉文,赵邦信,孔建寿,等.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(11):423-431.
Qian Yuwen,Zhao Bangxin,Kong Jianshou,et al.Robust covert timing channel based on Web[J].Journal of Computer Research and Development,2011,48(11):423-431.
[11]Ira Moskowitz,Myong Kang.Covert channels here to Stay?[A].Proceedings of the Ninth Annual Conference on Computer Assurance[C].Gaithersburg,USA:National Institute of Standards and Technology,1994:235-243.
[12]Wang Xinyuan,Douglas Reeves.Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays[A].Proceedings of the 2003 ACM Conference on Computer and Communications Security[C].Washington,DC,USA:ACM,2003:20-29.
[13]Steven Gianvecchio,Haining Wang.Detecting covert timing channels:An entropy based approach[A].Proceedings of ACM Conference on Computer and Communications Security[J].Alexandria,USA:ACM,2007:307-316.
相似文献/References:
[1]汪峥,钱焕延,汪婧雅,等.基于速度分治的车载物联网良性蠕虫模型[J].南京理工大学学报(自然科学版),2012,36(01):43.
WANG Zheng,QIAN Huan-yan,WANG Jing-ya,et al.New Anti-worm Model in Vehicular Internet of Things Based on Divide-and-conquer with Velocity[J].Journal of Nanjing University of Science and Technology,2012,36(05):43.
[2]王飞,钱玉文,王执铨,等.基于无监督聚类算法的入侵检测[J].南京理工大学学报(自然科学版),2009,(03):288.
WANG Fei,QIAN Yu-wen,WANG Zhi-quan.Intrusion Detection Based on Unsupervised Clustering Algorithm[J].Journal of Nanjing University of Science and Technology,2009,(05):288.
[3]徐延贵,等.MIPv6网络中蠕虫传播模型的构建与仿真[J].南京理工大学学报(自然科学版),2009,(06):839.
XU Yan-gui,QIAN Huan-yan,DU Hong-jun.Construction and Simulation of Worm Propagation Model in MIPv6 Networks[J].Journal of Nanjing University of Science and Technology,2009,(05):839.
[4]朱保平.基于配对函数的对称加密算法[J].南京理工大学学报(自然科学版),2003,(06):696.
Zhu Baoping.Symmetric Encryption Algorithm Based on Pairing Function[J].Journal of Nanjing University of Science and Technology,2003,(05):696.
[5]张琨,徐永红,王珩,等.基于免疫学的入侵检测系统模型[J].南京理工大学学报(自然科学版),2002,(04):337.
ZhangKun XuYonghong WangHeng LiuFengyu.Model of Intrusion Detection System Based on Immunology[J].Journal of Nanjing University of Science and Technology,2002,(05):337.
[6]徐永红,张琨,杨云,等.Smurf攻击及其对策研究[J].南京理工大学学报(自然科学版),2002,(05):512.
XuYonghong ZhangKun YangYun LiuFengyu.A Study on Smurf Attack and Its Countermeasures[J].Journal of Nanjing University of Science and Technology,2002,(05):512.
[7]赵建,李蔚清,杨秋昊.异构网络互连及其实时通信的研究与实现[J].南京理工大学学报(自然科学版),2000,(06):498.
ZhaoJian LiWeiqing YangQiuhao.Implementation of Real-time Communication on Heterogeneous Networks[J].Journal of Nanjing University of Science and Technology,2000,(05):498.
[8]朱保平,赵建.企业网中PBX的分析与研究[J].南京理工大学学报(自然科学版),1999,(06):573.
ZhuBaoping ZhaoJian.Analysis and Research on PBX in the Enterprise Network[J].Journal of Nanjing University of Science and Technology,1999,(05):573.
[9]王卫斌,孙吉振.一种网络协议一致性测试生成方法的改进[J].南京理工大学学报(自然科学版),1998,(03):24.
Wang Weibin Sun Jizhen.An Improved Method for Network Protocol Conformance Test Generation[J].Journal of Nanjing University of Science and Technology,1998,(05):24.
[10]唐洪宝,郭晓丹,孙亚民.网络多路接口控制器(NMC)性能分析[J].南京理工大学学报(自然科学版),1997,(02):69.
Tang Hongbao Guo xiaodan Sun Yamin.Performance Analysis of Network Multi interface Controller(NMC)[J].Journal of Nanjing University of Science and Technology,1997,(05):69.