[1]郭晓军,程光,周爱平,等.基于扩频Manchester码的可靠自同步网络隐蔽时间通信模型[J].东南大学学报(自然科学版),2015,45(1):23-30.[doi:10.3969/j.issn.1001-0505.2015.01.005]
 Guo Xiaojun,Cheng Guang,Zhou Aiping,et al.Robust and self-synchronous network covert timing communication model based on spread Manchester code[J].Journal of Southeast University (Natural Science Edition),2015,45(1):23-30.[doi:10.3969/j.issn.1001-0505.2015.01.005]
点击复制

基于扩频Manchester码的可靠自同步网络隐蔽时间通信模型()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
45
期数:
2015年第1期
页码:
23-30
栏目:
计算机科学与工程
出版日期:
2015-01-20

文章信息/Info

Title:
Robust and self-synchronous network covert timing communication model based on spread Manchester code
作者:
郭晓军123程光13周爱平13潘吴斌13朱琛刚13
1东南大学计算机科学与工程学院, 南京 210096; 2西藏民族学院信息工程学院, 咸阳 712082; 3东南大学计算机网络和信息集成教育部重点实验室, 南京 210096
Author(s):
Guo Xiaojun123 Cheng Guang13 Zhou Aiping13 Pan Wubin13 Zhu Chengang13
1School of Computer Science and Engineering, Southeast University, Nanjing 210096, China
2School of Information Engineering, Tibet Nationalities Institute, Xianyang 712082, China
3Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University, Nanjing 210096, China
关键词:
信息安全 网络隐蔽时间信道 Manchester编码 鲁棒性 隐蔽性
Keywords:
information security network covert timing channel Manchester code robustness covertness
分类号:
TP393
DOI:
10.3969/j.issn.1001-0505.2015.01.005
摘要:
针对包间延迟网络隐蔽时间信道存在的鲁棒性差、同步机制脆弱问题,提出了一种基于Manchester编码的可靠自同步网络隐蔽时间通信模型.首先,对秘密消息进行扩频操作,得到扩频码.然后,将流持续时间划分为若干相同长度时隙,每相邻两时隙构成一对,通过调整时隙对内包数量来模拟扩频码对应的Manchester编码中0和1的编码过程,以实现扩频码在流中的嵌入.同时,采用时间偏移量指示同步位置,使得调制后的流呈现自同步性,以便接收端准确恢复秘密消息.实验结果表明,与包间延迟方法相比,该模型能使收发双方更快速准确地保持同步,在不同网络负载下,秘密消息检测错误率最大值降低约85%,显著提升了对网络干扰因素的抵抗能力,且在网络流量较大时呈现出更好的隐蔽性.
Abstract:
To solve the problem of poor robustness and vulnerable synchronization of the current network covert timing channel using inter-packet delay(IPD), a robust and self-synchronous covert timing communication model based on spread manchester code(ROSMC)is proposed. First, the spectrum of the covert message is spread to produce spreading code(SC). Then, the duration of network flow is divided into many time intervals with equal length and two adjacent time intervals constitute one pair. Each bit of SC is embedded into flow through simulating 0 and 1 encoding process of the corresponding Manchester code(MC).The encoding process can be implemented by adjusting the number of the packets in the time interval pair. Meanwhile, an offset from the starting moment of flow is used to indicate the synchronous position. The offset and MC features make the adjusted flow present self-synchronization which can help receiver decode covert message accurately. The experimental results show that, compared with the IPD-based methods, the proposed model synchronizes sender and receiver more quickly and accurately. The maximum of the detection error rate can be reduced by 85% under different network traffic loads and the resistance to interference is significantly enhanced. Besides, the proposed model presents better covertness under heavier network traffic loads.

参考文献/References:

[1] 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258.
  Feng Dengguo, Zhang Min, Li Hao. Big data security and privacy protection[J]. Chinese Journal of Computers, 2014, 37(1): 246-258.(in Chinese)
[2] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
  Feng Dengguo, Zhang Min, Zhang Yan, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1): 71-83.(in Chinese)
[3] 谭庆丰,刘培朋,时金桥,等.UGC3:一种抵御审查的隐蔽通信方法[J].通信学报,2012,33(8):155-161.
  Tan Qingfeng, Liu Peipeng, Shi Jinqiao, et al. UGC3: a covert communication method defense against censorship[J]. Journal on Communications, 2012, 33(8): 155-161.(in Chinese)
[4] Rios R, Onieva J A, Lopez J. Covert communications through network configuration messages[J]. Computers & Security, 2013, 39: 34-46.
[5] 章思宇,邹福泰,王鲁华,等.基于DNS的隐蔽通道流量检测[J].通信学报,2013,34(5):143-151.
  Zhang Siyu, Zhou Futai, Wang Luhua, et al. Detecting DNS-based covert channel on live traffic[J]. Journal on Communications, 2013, 34(5): 143-151.(in Chinese)
[6] Cabuk S, Brodley C E, Shields C, et al. IP covert timing channels: design and detection[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. New York: ACM, 2004: 178-187.
[7] Archibald R, Ghosal D. A covert timing channel based on fountain codes[C]//2012 IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK, 2012: 970-977.
[8] 钱玉文,赵邦信,孔建寿,等.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(3):423-431.
  Qian Yuwen, Zhao Bangxin, Kong Jianshou, et al. Robust covert timing channel based on Web[J]. Journal of Computer Research and Development, 2011, 48(3): 423-431.(in Chinese)
[9] 牛小鹏,李清宝,王炜.一种基于扩频编码的可靠网络隐蔽信道设计方法[J].电子与信息学报,2013,35(4):1012-1016.
  Niu Xiaopeng, Li Qingbao, Wang Wei. A robust network covert channel algorithm based on spread coding[J]. Journal of Electronics & Information Technology, 2013, 35(4): 1012-1016.(in Chinese)
[10] Zhang Z, Guo Z, Yang Y. Bounded-reorder packet scheduling in optical cut-through switch[C]//2013 IEEE INFOCOM. Turin, Italy, 2013: 701-709.
[11] Narasiodeyar R M, Jayasumana A P. Improvement in packet-reordering with limited re-sequencing buffers: an analysis[C]//2013 IEEE Conference on Local Computer Networks. Sydney, Australia, 2013: 416-424.
[12] Liu Y, Ghosal D, Armknecht F, et al. Robust and undetectable steganographic timing channels for i.i.d. traffic[C]//Information Hiding Conference. Calgary, Canada, 2010: 193-207.
[13] Giustiniano D, Lenders V, Schmitt J B, et al. Detection of reactive jamming in DSSS-based wireless networks[C]//Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks. Budapest, Hungary, 2013: 43-48.
[14] 谢安,李冬红.概率论与数理统计[M].北京:清华大学出版社,2012:122-125.
[15] Netfilter Core Team. The netfilter.org “iptables” project [EB/OL].(2013-11-22)[2014-06-15]. http://www.netfilter.org./projects/iptables/index.html.

相似文献/References:

[1]李天目,仲伟俊,梅姝娥.平衡误差和扭曲的信息安全激励[J].东南大学学报(自然科学版),2007,37(5):940.[doi:10.3969/j.issn.1001-0505.2007.05.040]
 Li Tianmu,Zhong Weijun,Mei Shue.Information security incentive balance between error and distortion[J].Journal of Southeast University (Natural Science Edition),2007,37(1):940.[doi:10.3969/j.issn.1001-0505.2007.05.040]

备注/Memo

备注/Memo:
收稿日期: 2014-07-20.
作者简介: 郭晓军(1983—),男,博士生;程光(联系人),男,博士,教授,博士生导师,gcheng@njnet.edu.cn.
基金项目: 江苏省未来网络前瞻性基金资助项目(BY2013095-5-03)、江苏省普通高校研究生科研创新计划资助项目(KYLX_0141)、西藏自治区自然科学基金资助项目(2013).
引用本文: 郭晓军,程光,周爱平,等.基于扩频Manchester码的可靠自同步网络隐蔽时间通信模型[J].东南大学学报:自然科学版,2015,45(1):23-30. [doi:10.3969/j.issn.1001-0505.2015.01.005]
更新日期/Last Update: 2015-01-20