作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (2): 139-141. doi: 10.3969/j.issn.1000-3428.2009.02.049

• 安全技术 • 上一篇    下一篇

网络隐通道的构建方法研究

严 庆,刘 军,肖军模   

  1. (解放军理工大学通信工程学院电子信息系,南京 210007)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-01-20 发布日期:2009-01-20

Research on Construction Methods of Network Covert Channels

YAN Qing, LIU Jun, XIAO Jun-mo   

  1. (Department of Electronic Information, Communication Engineering School, PLA University of Science and Technology, Nanjing 210007)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-01-20 Published:2009-01-20

摘要: 针对网络隐通道能绕过防火墙或其他形式的安全防护系统的问题,从网络隐通道的构建原理方面讨论各种常见的构建隐通道的方法,提出2种新的隐通道构建方法:基于数据包长度特征编码的构建方法及基于数据包到达顺序编码的构建方法,讨论了构建网络隐通道时的关键问题。

关键词: 网络隐通道, TCP/IP协议, 网络安全

Abstract: Network covert channels poses a serious threat to the security of computer network for they can be used to bypass the firewalls or other forms of security systems. This paper analyzes the principle of the network covert channels and presents several means to set up network covert channels, and proposes two new methods to construct covert channel: a method based on the data packets’ length and another method based on the data packets’ arrival sequence. A few key issues on building network covert channel are discussed.

Key words: network covert channels, TCP/IP protocols, network security

中图分类号: