作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (5): 159-161,. doi: 10.3969/j.issn.1000-3428.2009.05.055

• 安全技术 • 上一篇    下一篇

基于BHO的网络隐蔽通道研究

王 娟1,郭永冲2,王 强3   

  1. (1. 南开大学信息技术科学学院,天津 300071;2. 中国人寿保险股份有限公司信息技术部,北京 100020; 3. 西安空军工程大学电讯工程学院,西安 710077)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-03-05 发布日期:2009-03-05

Research of Network Covert Channel Based on BHO

WANG Juan1, GUO Yong-chong2, WANG Qiang3   

  1. (1. College of Information Technology and Science, Nankai University, Tianjin 300071; 2. Department of Information Technology, China Life Insurance Company Limited, Beijing 100020; 3. College of Telecommunication Engineering, Xi’an Air University of Engineering, Xi’an 710077)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-03-05 Published:2009-03-05

摘要: 针对现有网络隐蔽通道在流量隐藏和代理穿透方面的不足,提出一种基于浏览器帮助对象(BHO)构建网络隐蔽通道的方法。BHO自身的“合法性”和“寄生性”不仅为躲避杀毒软件和防火墙提供天然屏障,而且能为流量隐藏和代理穿透提供有利条件。该文给出详细方案设计和代码框架,通过测试验证该隐蔽通道的有效性。针对其可能带来的危害,提出防御建议。

关键词: 网络隐蔽通道, 浏览器帮助对象, 流量隐藏, 代理穿透, 网络安全

Abstract: To alleviate the weakness of existed network covert channels in traffic concealing and proxy penetration, a new method of constructing covert channel based on BHO is proposed. The method using Internet space such as webmail, blog or bbs to transfer information. The legality and parasitic ness of BHO provides protection against anti-virus software and firewall, and make it easy to conceal traffic and penetate proxy. Detail design and code framework are given, tests are done to validate the network covert channel. Some advice are given to protect against this kind of network covert channel.

Key words: network covert channel, Browser Helper Object(BHO), traffic concealing, proxy penetration, network security

中图分类号: