共查询到20条相似文献,搜索用时 78 毫秒
1.
2.
3.
4.
5.
6.
7.
隐通道分析是研究高安全性计算机系统不可回避的问题。本文系统介绍了隐通道的概念,着重阐述基于信息流的存储隐通道标识方法,讨论该方法中的关键问题和重要细节。 相似文献
8.
本文讨论了计算机安全领域中较少研究的一个重要方面,时间隐通道。对时间隐通道的存在条件进行了总结,对存在于操作系统原语的时间隐通道的特征进行了分析,提出了相应的识别方法。同时还简单地给出了解决时间隐通道的一些方法。 相似文献
9.
10.
11.
Covert timing channels provide a mechanism to leak data across different entities. Manipulating the timing between packet arrivals is a well-known example of such approach. The time based property makes the detection of the hidden messages impossible by traditional security protecting mechanisms such as proxies and firewalls. This paper introduces a new generic hierarchical-based model to detect covert timing channels. The detection process consists of the analysis of a set of statistical metrics at consecutive hierarchical levels of the inter-arrival times flows. The statistical metrics considered are: mean, median, standard deviation, entropy, Root of Average Mean Error (RAME). A real statistical metrics timing channel dataset of covert and overt channel instances is created. The generated dataset is set to be either flat where the statistical metrics are calculated on all flows of data or hierarchal (5 levels of hierarchy were considered) where the statistical metrics are computed on sub parts of the flow as well. Following this method, 5 different datasets were generated, and used to train/test a deep neural network based model. Performance results about accuracy and model training time showed that the hierarchical approach outperforms the flat one by 4 to 10 percent (in terms of accuracy) and was able to achieve short model training time (in terms of seconds). When compared to the Support Vector Machine (SVM) classifier, the deep neural network achieved a better accuracy level (about 2.3% to 12% depends on the used kernel) and significantly shorter model training time (few seconds versus few 100’s of seconds). This paper also explores the importance of the used metrics in each level of the detection process. 相似文献
12.
13.
网络传输中采用隐蔽通道实现秘密通信 总被引:2,自引:0,他引:2
秘密通信是指要隐藏通信的实际存在.在网络传输中利用隐蔽通道实现秘密通信,涉及到网络安全和采用数据隐藏技术实现网络隐私.主要讨论隐蔽通道的研究框架、分类、评估,以及秘密通信协议的设计问题.隐蔽通道可以分为结构模式、行为模式和内容模式,比较各种不同通道例证,阐明结构模式和行为模式通道更容易被消除,而内容模式则更为可靠并且具有较高的带宽.多种通道模式混用将更适合于秘密通信协议的开发. 相似文献
14.
IP covert timing channel (IPCTC) is an unconventional communication channel which attaches time information to the packets of an overt channel as messages carriers, e.g., using different inter-packet delays to transmit messages in a packet-switched network. Although the IPCTCs have many different communication methods, based on the concept of time, we categorized the base communication model of the IPCTCs into three types and then utilized the signal processing theory to build their mathematical models. As a result, the basic characteristics of the IPCTCs’ base model were formally derived. Hence, the characteristics of any IPCTC can be derived from the base models that consist of the IPCTC. Furthermore, a set of approaches was devised to implement the base model of the IPCTCs in a TCP/IP network. Experimental results show the correctness of the proposed base model of the IPCTCs in this paper. 相似文献
15.
陶松 《数字社区&智能家居》2014,(8):5198-5200
隐蔽信道可以在不违反系统安全策略的情况下进行信息泄露,该文解释了网络隐蔽信道的概念,介绍了网络隐蔽信道的分类和一般工作原理。然后,针对计算机网络各层次分别介绍了常见的隐蔽通道,并对各种隐蔽通道的工作原理和实现方法做了详细的分析,在此基础上给出了一些检测和阻断网络隐蔽信道的方法和思路。 相似文献
16.
基于网络协议的隐蔽通道研究与实现 总被引:9,自引:0,他引:9
卢大航 《计算机工程与应用》2003,39(2):183-186
网络隐蔽通道是网络攻击中的一种重要手段,也是评估防火墙和入侵检测系统的防御性能的一种重要技术途径。论文从分析TCP/IP协议的安全缺陷入手,建立了利用网络协议的头结构实现隐蔽通道的通用模型,研究并实现了IP协议和ICMP协议的网络隐蔽通道。 相似文献
17.
We study the algebraic structure of the monoid of binary channels and show that it is dually isomorphic to the interval domain over the unit interval with the operation from Martin (2006) [4]. We show that the capacity of a binary channel is Scott continuous as a map on the interval domain and that its restriction to any maximally commutative submonoid of binary channels is an order isomorphism onto the unit interval. These results allows us to solve an important open problem in the analysis of covert channels: a provably correct method for injecting noise into a covert channel which will reduce its capacity to any level desired in such a way that the practitioner is free to insert the noise at any point in the system. 相似文献
18.
网络秘密信道机理与防范 总被引:2,自引:0,他引:2
阐述了网络秘密信道的通信系统模型,提出了秘密信道的分类方法,深入研究了建立网络秘密信道的机理,并指出了基于数字水印技术和阈下通道技术建立网络秘密信道的可行性。对典型的建立网络秘密信道的工具作了仔细剖析,并在此基础上给出了有效的应对策略。 相似文献
19.
20.