[1] ZHANG Lihua,LIU Guangjie,DAI Yuewei.Network packet length covert channel based on empirical distribution function[J].Journal of Networks,2014,9(6):1440-1446. [2] IBM.MQ telemetry transport[EB/OL].[2018-08-05].http://msqq.org. [3] EL-ATAWY A,DUAN Qi,AL-SHAER E.A novel class of robust covert channels using out-of-order packets[J].IEEE Transactions on Dependable and Secure Computing,2017,14(2):116-129. [4] ALSAFFAR H,JOHNSON D.Covert channel using the IP timestamp option of an IPv4 packet[C]//Proceedings of International Conference on Electrical and Bio-medical Engineering,Clean Energy and Green Computing.[S.l.]:The Society of Digital Information and Wireless Communication,2015:48-51. [5] MAVANI M,RAGHA L.Covert channel in IPv6 destination option extension header[C]//Proceedings of 2014 International Conference on Circuits,Systems,Communication and Information Technology Applications.Washington D.C.,USA:IEEE Press,2014:219-224. [6] HOVHANNISYAN H,LU Kejie,WANG Jianping.A novel high-speed IP-timing covert channel:design and evaluation[C]//Proceedings of 2015 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2015:7198-7203. [7] 王鹏,兰少华,张晶,等.一种基于TCP时间戳选项的时间隐蔽信道方法[J].解放军理工大学学报(自然科学版),2015,16(2):120-125. [8] LUO Xiapu,CHAN E W W,CHANG R K C.TCP covert timing channels:design and detection[C]//Proceedings of 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC.Washington D.C.,USA:IEEE Press,2008:420-429. [9] 张令通,罗森林.基于TCP协议首部的网络隐蔽通道技术研究[J].计算机工程与科学,2014,36(6):1072-1076. [10] 钱玉文,王飞,孔建寿.复杂网络隐蔽信道的检测算法研究[J].系统仿真学报,2012,24(4):825-829. [11] WANG Fei,HUANG Liusheng,MIAO Haibo,et al.A novel distributed covert channel in HTTP[J].Security and Communication Networks,2014,7(6):1031-1041. [12] TOMAR N,GAUR M S.Information theft through covert channel by exploiting HTTP post method[C]//Proceedings of 2013 International Conference on Wireless and Optical Communications Networks.Washington D.C.,USA:IEEE Press,2013:1-5. [13] 王永杰,刘京菊.基于DNS协议的隐蔽通道原理及性能分析[J].计算机工程,2014,40(7):102-105. [14] 李顺普.基于CNN的FTP隐蔽信道检测模型[D].哈尔滨:哈尔滨工程大学,2018. [15] AUMASSON J P,NEVES S,WILCOX-O'HEARN Z,et al.BLAKE2:simpler,smaller,fast as MD5[C]//Proceedings of International Conference on Applied Cryptography and Network Security.Berlin,Germany:Springer,2013:119-135. [16] RAFTOPOULOS E,DIMITROPOULOS X.A quality metric for IDS signatures:in the wild the size matters[EB/OL].[2018-08-05].https://jis-eurasipjournals.springeropen.com/articles/10.1186/1687-417X-2013-7. |