Abstract:
Network covert channels poses a serious threat to the security of computer network for they can be used to bypass the firewalls or other forms of security systems. This paper analyzes the principle of the network covert channels and presents several means to set up network covert channels, and proposes two new methods to construct covert channel: a method based on the data packets’ length and another method based on the data packets’ arrival sequence. A few key issues on building network covert channel are discussed.
Key words:
network covert channels,
TCP/IP protocols,
network security
摘要: 针对网络隐通道能绕过防火墙或其他形式的安全防护系统的问题,从网络隐通道的构建原理方面讨论各种常见的构建隐通道的方法,提出2种新的隐通道构建方法:基于数据包长度特征编码的构建方法及基于数据包到达顺序编码的构建方法,讨论了构建网络隐通道时的关键问题。
关键词:
网络隐通道,
TCP/IP协议,
网络安全
CLC Number:
YAN Qing; LIU Jun; XIAO Jun-mo. Research on Construction Methods of Network Covert Channels[J]. Computer Engineering, 2009, 35(2): 139-141.
严 庆;刘 军;肖军模. 网络隐通道的构建方法研究[J]. 计算机工程, 2009, 35(2): 139-141.