首页 | 本学科首页   官方微博 | 高级检索  
     

隐蔽信道新型分类方法与威胁限制策略
引用本文:王翀,王秀利,吕荫润,张常有,吴敬征,关贝,王永吉.隐蔽信道新型分类方法与威胁限制策略[J].软件学报,2020,31(1):228-245.
作者姓名:王翀  王秀利  吕荫润  张常有  吴敬征  关贝  王永吉
作者单位:中国科学院软件研究所协同创新中心,北京 100190;中国科学院大学,北京 100049;计算机科学国家重点实验室(中国科学院软件研究所),北京 100190;中央财经大学,北京100081;计算机科学国家重点实验室(中国科学院软件研究所),北京 100190;中国科学院软件研究所协同创新中心,北京 100190;计算机科学国家重点实验室(中国科学院软件研究所),北京 100190;Qatar Computing Research Institute, HBKU, Doha 999043, Qatar
基金项目:国家自然科学基金(U1636213,61772507,61672508);国家重点研发计划(2017YFB1002300)
摘    要:隐蔽信道是指恶意通信双方通过修改共享资源的数值、特性或状态等属性,来编码和传递信息的信道.共享资源的选取,由隐蔽信道的类型与具体通信场景所决定.早期,存储隐蔽信道和时间隐蔽信道主要存在于传统操作系统、网络和数据库等信息系统中.近年来,研究重点逐渐拓展到了3类新型隐蔽信道,分别为混合隐蔽信道、行为隐蔽信道和气隙隐蔽信道.对近年来国内外隐蔽信道研究工作进行了系统的梳理、分析和总结.首先,阐述隐蔽信道的相关定义、发展历史、关键要素和分析工作.然后,根据隐蔽信道共享资源的类型以及信道特征,提出新的隐蔽信道分类体系.首次从发送方、接收方、共享资源、编码机制、同步机制、评价指标和限制方法这7个方面,对近年来新型隐蔽信道攻击技术进行系统的分析和归纳,旨在为后续隐蔽信道分析和限制等研究工作提供有益的参考.进而,讨论了面向隐蔽信道类型的威胁限制技术,为设计面向一类隐蔽信道的限制策略提供研究思路.最后,总结了隐蔽信道中存在的问题和挑战.

关 键 词:隐蔽通信  隐蔽信道  隐蔽信道分类  信息隐藏  行为隐蔽信道
收稿时间:2018/4/5 0:00:00
修稿时间:2018/12/19 0:00:00

Categorization of Covert Channels and Its Application in Threat Restriction Techniques
WANG Chong,WANG Xiu-Li,LüYin-Run,ZHANG Chang-You,WU Jing-Zheng,GUAN Bei,WANG Yong-Ji.Categorization of Covert Channels and Its Application in Threat Restriction Techniques[J].Journal of Software,2020,31(1):228-245.
Authors:WANG Chong  WANG Xiu-Li  LüYin-Run  ZHANG Chang-You  WU Jing-Zheng  GUAN Bei  WANG Yong-Ji
Affiliation:Cooperative Innovation Center, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;University of Chinese Academy of Sciences, Beijing 100049, China;State Key Laboratory of Computer Science(Institute of Software, The Chinese Academy of Sciences), Beijing 100190, China,University of Chinese Academy of Sciences, Beijing 100190, China,Cooperative Innovation Center, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;University of Chinese Academy of Sciences, Beijing 100049, China;State Key Laboratory of Computer Science(Institute of Software, The Chinese Academy of Sciences), Beijing 100190, China,State Key Laboratory of Computer Science(Institute of Software, The Chinese Academy of Sciences), Beijing 100190, China,Cooperative Innovation Center, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;State Key Laboratory of Computer Science(Institute of Software, The Chinese Academy of Sciences), Beijing 100190, China,Qatar Computing Research Institute, HBKU, Doha 999043, Qatar and Cooperative Innovation Center, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;State Key Laboratory of Computer Science(Institute of Software, The Chinese Academy of Sciences), Beijing 100190, China
Abstract:Covert channels are communication channels that allow secret transfer of information between two malicious processes by modifying the value or modulating the timing behavior of shared resources. Shared resources in covert communications vary according to the underlying covert channels. Initially, covert storage channels and covert timing channels are widely existed in information systems. More recently the focus has shifted towards three new kinds of covert channels, namely, covert hybrid channels, covert behavior channels, and air-gap covert channels. This paper surveys existing techniques for constructing covert channels that have been reported in literature, especially the covert channels that are presented in recent years. First, the definition, history, and key elements of covert channels are introduced. Covert channel analysis is also included. Second, this paper proposes a categorization technique for these covert channels based on the shared resources and channel characteristics. This paper systematically analyzes the traditional and new covert channel attack techniques based on the seven key elements of the covert channels. Third, the countermeasures for covert channels aforementioned are also demonstrated to restrict the threat brought by covert channels and to provide guidelines for future works. Finally, the challenges and problems on covert channels are provided.
Keywords:covert communication  covert channel  covert channel categorization  information hiding  covert behavior channel
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号