当前位置:主页 > 管理论文 > 移动网络论文 >

基于数据流模型的长度式网络隐信道技术研究

发布时间:2018-03-11 04:33

  本文选题:长度式隐信道 切入点:隐信道构建 出处:《江苏科技大学》2014年硕士论文 论文类型:学位论文


【摘要】:计算机网络技术的迅猛发展在推动经济发展和社会进步,为人们的工作、生活带来便利的同时,也不可避免地引发了众多安全问题。隐蔽信道技术作为一种有效的秘密信息传输方式,受到了信息安全研究领域学者们的广泛重视。由于互联网数据流的诸多特性使其成为秘密消息传输的一种较好载体,网络隐信道逐渐成为了该研究领域的热点之一,有着重要的理论价值和应用价值。 长度式隐信道是网络隐信道中的一种,它通过调制网络数据包的长度来传递秘密消息;相比传统的存储式和时间式隐信道,它在隐蔽性和抗干扰能力方面都具有相对较好的性能。因此,本文在综述了网络隐信道研究现状的基础上,针对长度式隐信道展开了深入的研究。论文完成的主要工作如下: 1.为了研究和分析现有长度式隐信道算法,设计实现了长度式隐信道实验平台,该平台包含了目前隐蔽性有所增强的三种典型的长度式隐信道算法,分别是基于参考长度的隐蔽信道、DRCC隐信道和CACC隐信道。 2.采用基于信息熵和统计特征的检测方法,对基于参考长度的隐蔽信道、DRCC隐信道和CACC隐信道进行了安全性实验,实验结果表明上述算法均难以抵抗检测,缺乏隐蔽性。 3.基于直方图统计方法,建立了四种常用网络业务的数据包长度模型,根据正常HTTP文件传输业务的包长度统计分布模型,,提出并实现了基于数据流业务模型的长度式隐信道算法。检测结果表明,该算法能够较为有效地抵抗检测,对比目前的多数方法,其隐蔽性和安全性有所增强。 论文最后对全文进行了总结,指出了研究中的不足,并对今后的研究方向进行了展望。
[Abstract]:The rapid development of computer network technology not only promotes economic development and social progress, but also brings convenience to people's work and life. Covert channel technology is an effective way to transmit secret information. Due to the many characteristics of Internet data flow, it has become a better carrier of secret message transmission, and the network hidden channel has gradually become one of the hotspots in this field. Has the important theory value and the application value. The length hidden channel is one of the network hidden channels, which transmits secret messages by modulating the length of the network data packet, compared with the traditional storage and time hidden channels, It has relatively good performance in concealment and anti-jamming ability. Therefore, based on the review of the current research situation of the hidden channel in the network, a deep research on the long hidden channel is carried out. The main work accomplished in this paper is as follows:. 1. In order to study and analyze the existing length hidden channel algorithms, the experimental platform of length hidden channel is designed and implemented. The platform includes three typical length hidden channel algorithms which have improved concealment at present. It is covert channel based on reference length and CACC hidden channel, respectively. 2. Using the detection method based on information entropy and statistical features, the security experiments of the hidden channel and CACC channel based on the reference length are carried out. The experimental results show that the above algorithms are difficult to resist the detection and lack of concealment. 3. Based on histogram statistical method, the packet length model of four common network services is established. According to the statistical distribution model of packet length of normal HTTP file transmission service, A long hidden channel algorithm based on data flow traffic model is proposed and implemented. The detection results show that the algorithm can resist detection more effectively, and compared with most current methods, its concealment and security are enhanced. Finally, the paper summarizes the whole paper, points out the deficiency of the research, and looks forward to the future research direction.
【学位授予单位】:江苏科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08

【参考文献】

相关期刊论文 前6条

1 邹昕光;;基于FTP协议的命令序列隐蔽信道[J];哈尔滨工业大学学报;2007年03期

2 邹昕光;金海军;郝克成;孙圣和;;基于HTTP协议多维随机参数插入通信隐藏算法[J];计算机工程与应用;2006年34期

3 邹昕光;金海军;郝克成;孙圣和;;基于HTTP协议的参数排序通信隐藏算法[J];计算机工程;2006年20期

4 邹昕光;孙圣和;;基于TCP选项域的信息隐藏算法研究[J];计算机工程与设计;2006年12期

5 胡静;谢俊元;;IPSec协议中潜在的隐蔽信道问题研究[J];计算机工程与设计;2007年17期

6 谷传征;王轶骏;薛质;;基于DNS协议的隐蔽信道研究[J];信息安全与通信保密;2011年12期



本文编号:1596610

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1596610.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户cb13a***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com