参考文献
[1]ZANDER S,ARMITAGE G,BRANCH P.A Survey of Covert Channels and Countermeasures in Computer Network Protocols[J].IEEE Communications Surveys & Tutorials,2007,9(3):44-57.
[2]HANDEL T G,SANDFORD M T.Hiding Data in the OSI Network Model[C]//Proceedings of International Workshop on Information Hiding.Berlin,Germany:Springer,1996:23-38.
[3]AHSAN K,KUNDUR D.Practical Data Hiding in TCP/IP[C]//Proceedings of International Conference on Emerging Trends in Technology.New York,USA:ACM Press,2002:7-14.
[4]GIRLING C G.Covert Channels in LAN’s[J].IEEE Transactions on Software Engineering,1987,13(2):292-296.
[5]LUO Xiapu,CHAN E W W,CHANG R K C.TCP Covert Timing Channels:Design and Detection[C]//Proceedings of IEEE International Conference on Dependable Systems & Networks with Ftcs & Dcc.Washington D.C.,USA:IEEE Press,2008:420-429.
[6]CABUK S,BRODLEY C E,SHIELDS C.IP Covert Timing Channels:Design and Detection[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2004:178-187.
[7]SHAH G,MOLINA A,BLAZE M.Keyboards and Covert Channels[C]//Proceedings of Conference on USENIX Security Symposium.New York,USA:ACM Press,2006:59-75.
[8]邹昕光,金海军,郝克成,等.基于HTTP协议的参数排序通信隐藏算法[J].计算机工程,2006,32(20):147-149.
[9]ZI Xiaochao,YAO Lihong,PAN Li,et al.Implementing a Passive Network Covert Timing Channel[J].Computers & Security,2010,29(6):686-696.
[10]姚全珠,张鹏.基于数据包长度的网络隐蔽通道[J].计算机工程,2008,34(3):183-185.
[11]钱玉文,李勇,王执铨.网络包长度隐蔽信道的建模与仿真[J].系统仿真学报,2010,22(7):1773-1776.
[12]JI Liping,JIANG Wenhao,DAI Benyang,et al.A Novel Covert Channel Based on Length of Messages[C]//Proceedings of International Symposium on Information Engineering and Electronic Commerce.Washington D.C.,USA:IEEE Press,2009:551-554.
[13]OMAR S N,NGADI M A.DNS Request for Normal Minima Length Distribution Based on Reference Matrix[J].Communications in Computer and Information Science,2011,251:248-258.
[14]NAIR A S,KUMAR A,SUR A,et al.Length Based Network Steganography Using UDP Protocol[C]//Proceedings of the 3rd International Conference on Communication Software and Networks.Washington D.C.,USA:IEEE Press,2011:726-730.
[15]王茗倩.基于数据流模型的长度式网络隐信道技术研究[D].镇江:江苏科技大学,2014.
编辑顾逸斐 |