[1] GEISLER D,MAZURCZYK W,KELLER J.Towards utilization of covert channels as a green networking technique[C]//Proceedings of the 13th International Conference on Availability,Reliability and Security.New York,USA:ACM Press,2018:1-10. [2] LIU Fang,LI Dongdong,ZHAO Yuntao,et al.The covert communication detection model based on key field of header in HTTP protocol[J].Fire Control and Command Control,2018,43(11):40-45.(in Chinese) 刘芳,李东东,赵运弢,等.HTTP协议报文头域关键字段的隐蔽通信检测模型[J].火力与指挥控制,2018,43(11):40-45. [3] ZHANG Lihua.Research on Anti-interference Technology of covert channel in time network[D].Nanjing:Nanjing University of Science and Technology,2017.(in Chinese) 张立华.时间式网络隐蔽信道抗扰技术研究[D].南京:南京理工大学,2017. [4] KOGOS K G,SELIVERSTOVA E I,EPISHKINA A V.Review of covert channels over HTTP:communication and countermeasures[C]//Proceedings of 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering.Washington D.C.,USA:IEEE Press,2017:459-462. [5] LIANG Jun.The improvement and optimization of the network storage covert channel test simulation[J].Computer Simulation,2017,34(2):406-409.(in Chinese) 梁竣.网络存储隐蔽信道检测的改进与优化仿真[J].计算机仿真,2017,34(2):406-409. [6] LIU Zhengyi,SONG Tian.Covert sequence channel based on HTTP/2 protocol[J].Journal of Computer Research and Development,2018,55(6):1157-1166. [7] JOHNSON M,LUTZ P,JOHNSON D.Covert channel using man-in-the-middle over HTTPS[C]//Proceedings of 2016 International Conference on Computational Science and Computational Intelligence.Washington D.C.,USA:IEEE Press,2016:917-922. [8] WANG Fei.Research on design and detection technology of covert channels based on WEB[D].Hefei:University of Science and Technology of China,2014.(in Chinese) 王飞.基于WEB的隐蔽信道设计与检测技术研究[D].合肥:中国科学技术大学,2014. [9] ZHANG Xiaosing,LIANG Chen,ZHANG Quanxin,et al.Building covert timing channels by packet rearrangement over mobile networks[J].Information Sciences,2018,445:66-78.
[10] BELOZUBOVA A,EPISHKINA A,KOGOS K.Random delays to limit on/off covert channel[C]//Proceedings of the 18th Mediterranean Electrotechnical Conference.Washington D.C.,USA:IEEE Press,2016:1-5. [11] QI Wen,DING Wanfu,WANG Xinyu,et al.Construction and mitigation of user-behavior-based covert channels on smartphones[J].IEEE Transactions on Mobile Computing,2017,17(1):44-57. [12] SHEN Yao,HUANG Liusheng,WANG Fei,et al.LiHB:lost in HTTP behaviors-a behavior-based covert channel in HTTP[C]//Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security.New York,USA:ACM Press,2015:55-64. [13] QIAN Yuwen,SONG Huaju,ZHAO Bangxin,et al.Study on the detection algorithm of covert network behavior channel based on corrected entropy[J].Systems Engineering and Electronics,2013,35(6):1312-1317.(in Chinese) 钱玉文,宋华菊,赵邦信,等.基于校正熵的网络行为隐蔽信道的检测算法[J].系统工程与电子技术,2013,35(6):1312-1317. [14] REZAEI F,HEMPEL M,SHARIF H.Towards a reliable detection of covert timing channels over real-time network traffic[J].IEEE Transactions on Dependable and Secure Computing,2017,14(3):249-264. [15] QIAN Yuwen,SONG Huaju,SONG Chao,et al.Network covert channel detection with cluster based on hierarchy and density[J].Procedia Engineering,2012,29:4175-4180. [16] SAYADI S,ABBES T,BOUHOULA A.Detection of covert channels over ICMP protocol[C]//Proceedings of 2017 IEEE/ACS International Conference on Computer Systems and Applications.Washington D.C.,USA:IEEE Press,2017:1247-1252. [17] SUR A,NAIR A S,KUMAR A,et al.Steganalysis of network packet length based data hiding[J].Circuits,Systems,and Signal Processing,2013,32(3):1239-1256. [18] CABUK S,BRODLEY C E,SHIELDS C.IP covert channel detection[J].ACM Transactions on Information and System Security,2009,12(4):1-29. [19] LI Meng.Research on several typical network steganalysis algorithms[D].Zhenjiang:Jiangsu University of Science and Technology,2019.(in Chinese) 李萌.几种典型网络隐写检测算法研究[D].镇江:江苏科技大学,2019. [20] MA Wenyan.Several new application layer covert channels on the HTTP protocol[J].Computer CD Software and Applications,2014(15):179-180.(in Chinese) 马文岩.HTTP协议上几种新的应用层隐蔽通道[J].计算机光盘软件与应用,2014(15):179-180. [21] HAN Chunhao.Research and application of network traffic classification[D].Beijing:Beijing University of Chemical Technology,2017.(in Chinese) 韩春昊.网络流量分类研究与应用[D].北京:北京化工大学,2017. |