WO2022105645A1 - 一种融合型隐蔽信道的构建方法及系统 - Google Patents

一种融合型隐蔽信道的构建方法及系统 Download PDF

Info

Publication number
WO2022105645A1
WO2022105645A1 PCT/CN2021/129583 CN2021129583W WO2022105645A1 WO 2022105645 A1 WO2022105645 A1 WO 2022105645A1 CN 2021129583 W CN2021129583 W CN 2021129583W WO 2022105645 A1 WO2022105645 A1 WO 2022105645A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
secret information
data packets
segment
data packet
Prior art date
Application number
PCT/CN2021/129583
Other languages
English (en)
French (fr)
Inventor
张小松
郭琳虹
Original Assignee
唐山学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 唐山学院 filed Critical 唐山学院
Priority to US17/907,398 priority Critical patent/US20230275880A1/en
Publication of WO2022105645A1 publication Critical patent/WO2022105645A1/zh
Priority to ZA2022/05993A priority patent/ZA202205993B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the invention relates to the field of information transmission, in particular to a method and system for constructing a fusion covert channel.
  • a covert channel is a hidden communication path whose existence was not expected in the original creation of the communication system. Covert channels are divided into storage covert channels and time covert channels. A storage covert channel is when the sender writes to a memory location and the receiver reads the memory location, while a temporal covert channel is where a covert message is modulated into a temporal behavior at the sender and then decoded at the receiver.
  • the purpose of the present invention is to provide a method and system for constructing a fusion covert channel, which can effectively improve the capacity and concealment of the covert channel by merging the time covert channel and the storage covert channel.
  • the present invention provides the following scheme:
  • a method for constructing a fusion covert channel comprising:
  • the L-bit secret information is determined by the number of data packets of different source addresses
  • the padding information represented by a special value agreed with the receiver;
  • the carried secret information is the code corresponding to the arrangement order of the data packets in the second arrangement segment, and the one-to-one correspondence between the arrangement order and the code is negotiated by the sender and the receiver before sending the information.
  • the number of bits of the secret information where n represents the number of packets with different source addresses.
  • determining whether the m-bit information in the TCP sequence number field of other data packets in the second arrangement segment except the first data packet is replaced with remaining secret information specifically includes, When the demand for the covert channel capacity is higher than the channel capacity of the covert channel constructed by reordering the data packets, select the m-bit information in the TCP sequence number field of other data packets to replace the remaining secret information, otherwise, in the TCP sequence number field of other data packets None of the m bits of information is replaced with the remaining secret information.
  • the replacement of m-bit information in the TCP sequence number field of each data packet except the first data packet in the second arrangement segment with the remaining secret information or the remaining secret information and padding information specifically includes: :
  • the remaining secret information is classified according to the remaining secret information.
  • the data bit order of the information sequentially replaces the equal bit information of the TCP sequence number fields of other data packets in the second permutation segment except the first packet, and replaces the data packets in the second permutation segment with the secret Information in other fields of information is replaced with padding information.
  • the present invention is also used to provide a system for constructing a fusion covert channel, the system comprising:
  • the source address number acquisition module is used to acquire the number n of different source addresses of the data packets in the current cache, and the different source addresses represent different source terminals of the data packets collected by the sender;
  • the data packet sorting module is used to arrange the data packets of different source addresses into a first arrangement segment according to the order in which the data packets enter the cache, and to carry the L bits of secret information in the secret information to the data packets in the first arrangement segment. Reordering obtains the second arrangement segment, and the L-bit secret information is determined by the number of data packets of different source addresses;
  • the m-bit information replacement module is used to replace the m-bit information in the TCP sequence number field of the first data packet in the second arrangement segment with the number of data packets of the different source addresses.
  • the number of terminals N t is determined;
  • the secret information judgment module is used to determine whether the m-bit information in the TCP sequence number field of the other data packets in the second arrangement segment except the first data packet is replaced with the remaining secret information according to the requirements of the covert channel capacity, so the The remaining secret information is the other secret information after removing the L bits of secret information; if it is replaced with the remaining secret information, then let the m+1th bit in the TCP sequence number field of the first data packet in the second arrangement segment be "1" ", and perform the step "replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second permutation segment with the remaining secret information and/or padding information", otherwise let The m+1th bit in the TCP sequence number field of the first data packet in the second sequence segment is "0", and the step "sends the data packet in the second sequence segment to the receiver";
  • a replacement module configured to replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second arrangement segment with the remaining secret information or the remaining secret information and padding information, the
  • the padding information is the padding information represented by a special value agreed by the sender and the receiver;
  • a sending module used for sending the data packets in the second sorting segment to the receiver
  • the secret information judgment module is used to judge whether the secret transmission of all the secret information has been completed. If the transmission has been completed, the covert communication will end; Arrange the data packets with different source addresses into the first arrangement segment according to the order in which the data packets enter the cache" and continue to execute.
  • the present invention discloses the following technical effects:
  • the invention rearranges the data packets of different terminals in the Internet of Things in a way of carrying secret information, which is very difficult for the attacker to detect covert channels in the Internet of Things application scenario containing a large number of terminal data packets;
  • the size of each arrangement segment varies with the actual transmission process, and the value is transmitted through the storage covert channel, which further improves the concealment of the fusion covert channel.
  • FIG. 1 is a flowchart of a method for constructing a converged covert channel according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic structural diagram of a system for constructing a converged covert channel according to Embodiment 2 of the present invention.
  • the purpose of the present invention is to provide a method and system for constructing a fusion covert channel, which fuses the time covert channel and the storage covert channel to more effectively improve the capacity and concealment of the covert channel.
  • the network covert channel is used as a means of information security transmission, which is covertly sent to the destination through the communication network by replacing the secret information in the network traffic.
  • converged covert channels can cover secret transmissions by extending covert bits between different types of data hiding techniques, which can improve both stealth and covert channel capacity.
  • the fusion covert channel proposed by the present invention is a time covert channel constructed by rearranging data packets of different terminals in the Internet of Things to hide secret information and a storage covert channel constructed by replacing the TCP sequence number field of the data packet with secret information. It is formed together, and the parameter information of the time covert channel is also transmitted through the storage covert channel.
  • Such a converged covert channel can not only adapt to the application scenarios of the Internet of Things, but also can flexibly adjust the replacement capacity of secret information according to the actual needs and the quality of the communication network. It is an effective confidential transmission method in the Internet of Things environment.
  • the fusion covert channel proposed by the present invention makes use of the characteristic that the number of networked terminals in the Internet of Things is generally large to make up for the shortage of small network traffic, so that the constructed fusion covert channel can achieve high capacity. Moreover, the characteristics of distributed multi-terminal also make covert channels more difficult to detect. More importantly, the fusion of time covert channel and storage covert channel more effectively improves the capacity and concealment of covert channel.
  • This embodiment is used to provide a method for constructing a fusion covert channel. As shown in FIG. 1 , the method includes the following steps:
  • Step 101 Obtain the number of different source addresses of the data packets currently in the cache, where the different source addresses represent different source terminals of the data packets collected by the sender.
  • Step 102 Arrange the data packets of different source addresses into a first arrangement segment according to the order in which the data packets enter the cache, and reorder the data packets in the first arrangement segment by carrying L bits of secret information in the secret information to obtain the first arrangement segment.
  • the second arrangement segment, the L-bit secret information is determined by the number of data packets with different source addresses.
  • the secret information carried is the code corresponding to the arrangement order of the data packets in the second arrangement segment, and the one-to-one correspondence between the arrangement order and the code is negotiated by the sender and the receiver before sending the information.
  • the number of bits of the secret information is where n represents the number of packets with different source addresses.
  • each permutation can be hidden Bit secret information
  • the sender and the receiver can agree on the one-to-one correspondence between the arrangement order of the data packets and the coding scheme: the data packets are arranged as "P 1 P 2 P 3 " to represent "00", and the arrangement is "P 1 " P 3 P 2 " means "01", and the arrangement is "P 2 P 1 P 3 " and "P 2 P 3 P 1 " both mean “10", “P 3 P 1 P 2 " and "P 3 P 2 P” 1 " means "11”, therefore, when the secret information that the sender wants to carry is "01", the ordering method of the data packets in the second arrangement segment can be set to "P 1 P 3 P 2 ", receiving After receiving the data packet, the party can automatically decrypt it into the secret information "01".
  • This step is the construction process of the time covert channel.
  • Step 103 Replace the m-bit information in the TCP sequence number field of the first data packet in the second arrangement segment with the number of data packets of the different source addresses, and the size of m is determined according to the number of terminals N t connected by the sender. Sure.
  • the size of m in the m-bit information is:
  • the number of terminals N t here refers to the total number of terminals connected to the sender, but not every terminal will send data.
  • the data packets involved in the current cache are sent by the terminal that has sent the data.
  • the number of terminals that have sent data is n, that is, n ⁇ N t .
  • Step 104 Determine whether the m-bit information in the TCP sequence number field of the other data packets in the second arrangement segment except the first data packet is replaced with the remaining secret information according to the requirement of the covert channel capacity, and the remaining secret information In order to remove other secret information after L bits of secret information; if it is replaced with the remaining secret information, set the m+1th bit in the TCP sequence number field of the first data packet in the second arrangement segment to "1", and execute Step "replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second permutation segment with the remaining secret information or the remaining secret information and padding information", otherwise let the second The m+1th bit in the TCP sequence number field of the first data packet in the sequence segment is "0", and the step "send the data packet in the second sequence segment to the receiver" is performed.
  • the sender requires quantitative secret information to be sent out within a limited time, but the capacity of the previously constructed time covert channel cannot meet the requirement.
  • the required covert channel capacity is higher than the covert channel capacity constructed by data packet rearrangement, then It is necessary to cooperate with the storage covert channel to replace the secret information in the data packet, so as to expand the covert channel capacity and meet the needs of covert communication.
  • Step 105 Replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second arrangement segment with the remaining secret information or the remaining secret information and padding information, wherein the The padding information is the padding information represented by a special value agreed upon by the sender and the receiver.
  • the remaining secret information is classified according to the remaining secret information.
  • the data bit order of the information sequentially replaces the equal bit information of the TCP sequence number fields of other data packets in the second permutation segment except the first packet, and replaces the data packets in the second permutation segment with the secret Information in other fields of information is replaced with padding information. This step is the construction of the fusion covert channel.
  • the remaining 70 bits are first
  • the secret information replaces the equal-bit information of the TCP sequence number field of other data packets described in the second arrangement section according to the data bit order of the remaining secret information, and then replaces the data packets in the second arrangement section with the remaining secret information.
  • the information in the other fields of is replaced with padding information.
  • Step 106 Send the data packets in the second sequence segment to the receiver.
  • Step 107 Determine whether the secret transmission of all the secret information has been completed. If the transmission has been completed, the covert communication is over; The data packets are arranged into the first arrangement segment according to the order in which the data packets enter the buffer," continue to execute.
  • the converged covert channel provided in this embodiment makes use of the characteristic that the number of networked terminals in the Internet of Things is generally large to make up for the shortage of small network traffic, so that the constructed converged covert channel can achieve high capacity. Moreover, the characteristics of distributed multi-terminal also make covert channels more difficult to detect. More importantly, the fusion of time covert channel and storage covert channel more effectively improves the capacity and concealment of covert channel.
  • This embodiment is used to provide a system for constructing a converged covert channel. As shown in FIG. 2 , the system includes:
  • the source address number acquisition module is used to acquire the number n of different source addresses of the data packets in the current cache, and the different source addresses represent different source terminals of the data packets collected by the sender;
  • the data packet sorting module is used to arrange the data packets of different source addresses into a first arrangement segment according to the order in which the data packets enter the cache, and to carry the L bits of secret information in the secret information to the data packets in the first arrangement segment. Reordering obtains the second arrangement segment, and the L-bit secret information is determined by the number of data packets of different source addresses;
  • the m-bit information replacement module is used to replace the m-bit information in the TCP sequence number field of the first data packet in the second arrangement segment with the number of data packets of the different source addresses.
  • the number of terminals N t is determined;
  • the secret information judgment module is used to determine whether the m-bit information in the TCP sequence number field of the other data packets in the second arrangement segment except the first data packet is replaced with the remaining secret information according to the requirements of the covert channel capacity, so the The remaining secret information is the other secret information after removing the L bits of secret information; if it is replaced with the remaining secret information, then let the m+1th bit in the TCP sequence number field of the first data packet in the second arrangement segment be "1" ", and perform the step "replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second permutation segment with the remaining secret information or the remaining secret information and padding information", Otherwise, let the m+1th bit in the TCP sequence number field of the first data packet in the second sequence segment be "0", and execute the step "send the data packet in the second sequence segment to the receiver";
  • a replacement module configured to replace the m-bit information in the TCP sequence number field of each data packet except the first data packet in the second arrangement segment with the remaining secret information or the remaining secret information and padding information, the
  • the padding information is the padding information represented by a special value agreed by the sender and the receiver;
  • a sending module used for sending the data packets in the second sorting segment to the receiver
  • the secret information judgment module is used to judge whether the secret transmission of all the secret information has been completed. If the transmission has been completed, the covert communication will end; Arrange the data packets with different source addresses into the first arrangement segment according to the order in which the data packets enter the cache" and continue to execute.
  • the replacement module includes a remaining secret information replacement module and a remaining secret information and padding information replacement module, and the remaining secret information replacement module is used when the number of bits of the remaining secret information is greater than or equal to that in the second arrangement segment
  • the sum of m bits in the TCP sequence number field of the packets other than the first packet will be added to the TCP sequence number field of each packet except the first in the second permutation segment
  • the m bits of information are replaced with the remaining secret information.
  • the remaining secret information and padding information replacement module is used when the number of bits of the remaining secret information is less than the sum of m bits in the TCP sequence number field of other data packets in the second arrangement segment except the first data packet , replace the remaining secret information in turn according to the data bit order of the remaining secret information to replace the equal number of bits information of the TCP sequence number fields of other data packets in the second arrangement segment except the first data packet, and arrange the second Information in other fields not replaced with secret information in packets in the segment is replaced with padding information.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明涉及一种融合型隐蔽信道的构建方法及系统,通过物联网中不同终端的数据包以携带秘密信息的方式重排来构建时间隐蔽信道,并通过数据包的TCP序列号字段替换为秘密信息来构建存储隐通道,通过将时间隐蔽信道和存储隐蔽信道融合构建的融合型隐蔽信道,能够使两种信道优势互补,既提高了融合型隐蔽信道的隐蔽性又提高了隐蔽信道容量。

Description

一种融合型隐蔽信道的构建方法及系统
本申请要求于2020年11月23日提交中国专利局、申请号为202011317532.X、发明名称为“一种融合型隐蔽信道的构建方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息传输领域,特别是涉及一种融合型隐蔽信道的构建方法及系统。
背景技术
随着物联网空前的快速发展,物联网带来显而易见的好处的同时,用户隐私和数据安全也正面临技术发展带来的威胁。如何在享受物联网提供的服务的便利性的同时又不遭受隐私和数据泄露的威胁已成为一个重要的安全问题。由于物联网边界是可渗透的并且难以防御外部威胁,因此隐私保护和数据传输安全已成为物联网技术普及的巨大障碍。有鉴于此,隐蔽信道可以成为传输隐藏在不受信任的物联网中的保密信息的安全有效方法。
隐蔽信道是隐藏的通信路径,在通信系统的原始创建中并不期望隐蔽信道的存在。隐蔽通道分为存储隐蔽信道和时间隐蔽信道。存储隐蔽信道是指发送方写入存储位置并由接收方读取存储位置,而时间隐蔽信道是指在发送方将隐蔽消息调制为时间行为,然后在接收方将隐蔽消息解码。
由于与典型互联网设备相比,物联网设备所产生的网络流量较小,因此通常认为该流量可能不适合隐蔽传输。到目前为止,很少有研究工作涉及构建物联网场景下的隐蔽信道。因此急需一种物联网场景下的隐蔽信道的构建方法。
发明内容
本发明的目的是提供一种融合型隐蔽信道的构建方法及系统,通过将时间隐蔽信道和存储隐蔽信道融合进而更为有力地提高隐蔽信道的容量和隐蔽性。
为实现上述目的,本发明提供了如下方案:
一种融合型隐蔽信道的构建方法,所述方法包括:
获取当前缓存中数据包的不同源地址个数,不同源地址代表发送方所收集的数据包的不同来源终端;
将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定;
用所述不同源地址的数据包个数替换第二排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发送方连入的终端数量N t来确定;
根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息和/或填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”;
将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息;
将第二排序段中的数据包发送到接收方;
判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段”继续执行。
可选的,携带的秘密信息为第二排列段中数据包排列次序对应的编码,所述排列次序与所述编码的一一对应关系由发送方和接收方在发送信 息之前商定。
可选的,所述秘密信息的位数
Figure PCTCN2021129583-appb-000001
其中n表示不同源地址的数据包个数。所述m位信息的大小
Figure PCTCN2021129583-appb-000002
可选的,所述根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息具体包括,当隐蔽信道容量的需求高于利用数据包重新排序构建的隐蔽信道的信道容量时,选择其他数据包TCP序列号字段中的m位信息替换为剩余秘密信息,否则其他数据包TCP序列号字段中的m位信息均不替换为剩余秘密信息。
可选的,所述将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息具体包括:
当所述剩余秘密信息的位数大于或等于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息均替换为剩余秘密信息。
当所述剩余秘密信息的位数小于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将剩余秘密信息按照所述剩余秘密信息的数据位顺序依次替换第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段的相等位数信息,并将第二排列段中的数据包中未替换为秘密信息的其他字段中的信息用填补信息替换。
本发明还用于提供一种融合型隐蔽信道的构建系统,所述系统包括:
源地址个数获取模块,用于获取当前缓存中数据包的不同源地址个数n,不同源地址代表发送方所收集的数据包的不同来源终端;
数据包排序模块,用于将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定;
m位信息替换模块,用于用所述不同源地址的数据包个数替换第二排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发 送方连入的终端数量N t来确定;
秘密信息判断模块,用于根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息和/或填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”;
替换模块,用于将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息;
发送模块,用于将第二排序段中的数据包发送到接收方;
秘密信息判断模块,用于判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段”继续执行。
根据本发明提供的具体实施例,本发明公开了以下技术效果:
(1)隐蔽性强。本发明通过物联网中不同终端的数据包以携带秘密信息的方式重排,这对于攻击方来说,对于包含大量终端数据包的物联网应用场景的隐蔽信道检测的难度非常大;同时,通过排列段方式分组重排,每个排列段大小随实际传输过程变化,且该值通过存储隐蔽信道传递,进一步提高了该融合型隐蔽信道的隐蔽性。
(2)容量高。虽然物联网的网络流量不高,但物联网中的联网终端数一般很大,那么本发明中的不同终端的数据包重排带来的每个排列段的隐蔽信息位数较大,这将提高隐蔽信道容量;同时,在网络通信质量较好的情况下,每个排列段中除了第一个数据包之外的其他数据包都可以替换m位秘密信息,这样必将进一步提高该隐蔽信道的容量。
说明书附图
下面结合附图对本发明作进一步说明:
图1为本发明实施例一所提供的融合型隐蔽信道的构建方法的流程图。
图2为本发明实施例二所提供的融合型隐蔽信道的构建系统的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的目的是提供一种融合型隐蔽信道的构建方法及系统,将时间隐蔽信道和存储隐蔽信道融合进而更为有力地提高隐蔽信道的容量和隐蔽性。
在物联网日益普及的今天,大量异构的物联网设备连接到Internet,从安全角度来看,它们越来越容易受到网络攻击。在这种场景下,网络隐蔽信道作为一种信息保密传输手段,通过将秘密信息替换在网络流量中通过通信网络隐蔽地发送到目的端。鉴于物联网的网络流量相对较小特点,融合型隐蔽信道可以通过在不同类型的数据隐藏技术之间扩展隐蔽位来掩盖秘密传输,既能够提高隐蔽性,也能够提高隐蔽信道容量。本发明提出的融合型隐蔽信道是由通过物联网中不同终端的数据包重排以隐藏秘密信息来构建的时间隐蔽信道和通过数据包的TCP序列号字段替换为秘密信息来构建的存储隐通道共同组建,且时间隐蔽信道的参数信息也通过存储隐蔽信道辅助传递。这样的融合型隐蔽信道既可以适应物联网应用场景,又能够根据实际需求和通信网络质量灵活调整秘密信息的替换容量,是物联网环境下的一种有效保密传输方法。
本发明提出的融合型隐蔽信道,就是利用物联网中的联网终端数一般较大的特点,弥补网络流量较小的不足,使得所构建的融合型隐蔽信道可 以达到高容量。而且,分布式多终端的特点也使得隐蔽信道更难以检测。更重要的是,时间隐蔽信道与存储隐蔽信道的融合更为有力地提高隐蔽信道的容量和隐蔽性。
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图和具体实施方式对本发明作进一步详细的说明。
实施例一
本实施例用于提供一种融合型隐蔽信道的构建方法,如图1所示,所述方法包括如下步骤:
步骤101:获取当前缓存中数据包的不同源地址个数,不同源地址代表发送方所收集的数据包的不同来源终端。
步骤102:将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定。
其中,携带的秘密信息为第二排列段中数据包排列次序对应的编码,所述排列次序与所述编码的一一对应关系由发送方和接收方在发送信息之前商定,秘密信息的位数
Figure PCTCN2021129583-appb-000003
其中n表示不同源地址的数据包个数。
例如,若n=3,即当前排列段中只有3个不同源地址的数据包,则有3!=6种排列序列,每个排列序列可以隐藏
Figure PCTCN2021129583-appb-000004
位秘密信息,那么发送方和接收方就可以提前商定数据包的排列次序与编码方案的一一对应关系:数据包排列为“P 1P 2P 3”表示“00”,排列为“P 1P 3P 2”表示“01”,排列为“P 2P 1P 3”和“P 2P 3P 1”都表示“10”,“P 3P 1P 2”和“P 3P 2P 1”都表示“11”,因此,当发送方想要携带的秘密信息为“01”时,就可以将第二排列段中数据包的排序方法设置为“P 1P 3P 2”,接收方在接收到数据包后,就可以自动将其解密为秘密信息“01”。此步骤即为时间隐蔽信道的构建过程。
步骤103:用所述不同源地址的数据包个数替换第二排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发送方连入的终端数量N t来确定。
其中,所述m位信息中m的大小为:
Figure PCTCN2021129583-appb-000005
需要说明的是,这里的终端数量N t指的是发送端连入的终端总数,但并非每个终端都会发送数据,在当前缓存中涉及到的数据包是已经发送了数据的终端发来的,而发送了数据的终端数是n,也就是说n≤N t
步骤104:根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”。
具体的,当隐蔽信道容量的需求高于利用数据包重新排序构建的隐蔽信道的信道容量时,选择其他数据包TCP序列号字段中的m位信息替换为剩余秘密信息,否则其他数据包TCP序列号字段中的m位信息均不替换为剩余秘密信息。
例如,发送方要求定量秘密信息在限定时间内发送出去,而前面构建的时间隐蔽信道的容量无法完成要求,此时即为所需隐蔽信道容量高于数据包重排构建的隐蔽信道容量,那么就要配合使用存储隐蔽信道,向数据包中替换秘密信息,以使扩展隐蔽信道容量,满足隐蔽通信需求。
步骤105:将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息,其中,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息。
具体的,当所述剩余秘密信息的位数大于或等于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和(即(n-1)×m位),将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息均替换为剩余秘密信息;
当所述剩余秘密信息的位数小于所述第二排列段中除第一个数据包 之外的其他数据包的TCP序列号字段中的m位之和,将剩余秘密信息按照所述剩余秘密信息的数据位顺序依次替换第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段的相等位数信息,并将第二排列段中的数据包中未替换为秘密信息的其他字段中的信息用填补信息替换。此步骤即为融合型隐蔽信道的构建。
例如,当剩余秘密信息的位数为70位,而除第一个数据包之外的其他数据包的TCP序列号字段中的m位信息的容量和为100位,则先将剩余的70位秘密信息按照剩余秘密信息的数据位顺序替换第二排列段中所述的其他数据包的TCP序列号字段的相等位数信息,再将第二排列段中的数据包中未替换为剩余秘密信息的其他字段中的信息用填补信息替换。
步骤106:将第二排序段中的数据包发送到接收方。
步骤107:判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,”继续执行。
本实施例提供的融合型隐蔽信道,利用物联网中的联网终端数一般较大的特点,弥补网络流量较小的不足,使得所构建的融合型隐蔽信道可以达到高容量。而且,分布式多终端的特点也使得隐蔽信道更难以检测。更重要的是,时间隐蔽信道与存储隐蔽信道的融合更为有力地提高隐蔽信道的容量和隐蔽性。
实施例2:
本实施例用于提供一种融合型隐蔽信道的构建系统,如图2所示,所述系统包括:
源地址个数获取模块,用于获取当前缓存中数据包的不同源地址个数n,不同源地址代表发送方所收集的数据包的不同来源终端;
数据包排序模块,用于将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定;
m位信息替换模块,用于用所述不同源地址的数据包个数替换第二 排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发送方连入的终端数量N t来确定;
秘密信息判断模块,用于根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”;
替换模块,用于将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息;
发送模块,用于将第二排序段中的数据包发送到接收方;
秘密信息判断模块,用于判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段”继续执行。
其中,所述替换模块包括剩余秘密信息替换模块以及剩余秘密信息和填补信息替换模块,所述剩余秘密信息替换模块用于当所述剩余秘密信息的位数大于或等于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息均替换为剩余秘密信息。
剩余秘密信息和填补信息替换模块用于当所述剩余秘密信息的位数小于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将剩余秘密信息按照所述剩余秘密信息的数据位顺序依次替换第二排列段中除第一个数据包之外的其他数据包的TCP序列 号字段的相等位数信息,并将第二排列段中的数据包中未替换为秘密信息的其他字段中的信息用填补信息替换。
本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处。综上所述,本说明书内容不应理解为对本发明的限制。

Claims (10)

  1. 一种融合型隐蔽信道的构建方法,其特征在于,所述方法包括:
    获取当前缓存中数据包的不同源地址个数,不同源地址代表发送方所收集的数据包的不同来源终端;
    将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定;
    用所述不同源地址的数据包个数替换第二排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发送方连入的终端数量N t来确定;
    根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”;
    将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息和/或填补信息,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息;
    将第二排序段中的数据包发送到接收方;
    判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段”继续执行。
  2. 根据权利要求1所述的融合型隐蔽信道的构建方法,其特征在于,携带的秘密信息为第二排列段中数据包排列次序对应的编码,所述排列次序与所述编码的一一对应关系由发送方和接收方在发送信息之前商定。
  3. 根据权利要求1所述的融合型隐蔽信道的构建方法,其特征在于,所述秘密信息的位数
    Figure PCTCN2021129583-appb-100001
    其中n表示不同源地址的数据包个数。
  4. 根据权利要求1所述的的融合型隐蔽信道的构建方法,其特征在于,所述m位信息的大小
    Figure PCTCN2021129583-appb-100002
  5. 根据权利要求1所述的的融合型隐蔽信道的构建方法,其特征在于,所述根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息具体包括:当隐蔽信道容量的需求高于利用数据包重新排序构建的隐蔽信道的信道容量时,选择其他数据包TCP序列号字段中的m位信息替换为剩余秘密信息,否则其他数据包TCP序列号字段中的m位信息均不替换为剩余秘密信息。
  6. 根据权利要求1所述的的融合型隐蔽信道的构建方法,其特征在于,所述将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息具体包括:
    当所述剩余秘密信息的位数大于或等于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息均替换为剩余秘密信息。
  7. 根据权利要求1所述的的融合型隐蔽信道的构建方法,其特征在于,所述将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息具体包括:
    当所述剩余秘密信息的位数小于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将剩余秘密信息按照所述剩余秘密信息的数据位顺序依次替换第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段的相等位数信息,并将第二排列段中的数据包中未替换为秘密信息的其他字段中的信息用填补信息替换。
  8. 一种融合型隐蔽信道的构建系统,其特征在于,所述系统包括:
    源地址个数获取模块,用于获取当前缓存中数据包的不同源地址个数 n,不同源地址代表发送方所收集的数据包的不同来源终端;
    数据包排序模块,用于将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段,对第一排列段中的数据包以携带秘密信息中的L位秘密信息的方式重新排序获得第二排列段,所述的L位秘密信息由不同源地址的数据包个数确定;
    m位信息替换模块,用于用所述不同源地址的数据包个数替换第二排列段中第一个数据包的TCP序列号字段中的m位信息,m的大小根据发送方连入的终端数量N t来确定;
    秘密信息判断模块,用于根据隐蔽信道容量的需求确定所述第二排列段中除第一个数据包外的其他数据包的TCP序列号字段中的m位信息是否替换为剩余秘密信息,所述剩余秘密信息为除去L位秘密信息后的其他秘密信息;如果替换为剩余秘密信息,则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“1”,并执行步骤“将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息和/或填补信息”,否则令第二排列段中第一个数据包的TCP序列号字段中的第m+1位为“0”,并执行步骤“将第二排序段中的数据包发送到接收方”;
    替换模块,用于将第二排列段中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息替换为剩余秘密信息或剩余秘密信息和填补信息,所述填补信息为发送发和接收方约定的由特殊值表示的填补信息;
    发送模块,用于将第二排序段中的数据包发送到接收方;
    秘密信息判断模块,用于判断所述秘密信息是否全部隐蔽传输完毕,若已经传输完毕,则隐蔽通信结束;若未完毕,则获取下一时刻不同源地址的数据包个数,并返回步骤“将不同源地址的数据包按照数据包进入缓存中的次序排列成第一排列段”继续执行。
  9. 根据权利要求8所述的融合型隐蔽信道的构建系统,其特征在于,所述替换模块包括剩余秘密信息替换模块,所述剩余秘密信息替换模块用于当所述剩余秘密信息的位数大于或等于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将第二排列段 中除了第一个数据包之外的其他每个数据包的TCP序列号字段中的m位信息均替换为剩余秘密信息。
  10. 根据权利要求8所述的融合型隐蔽信道的构建系统,其特征在于,所述替换模块包括剩余秘密信息和填补信息替换模块,所述剩余秘密信息和填补信息替换模块用于当所述剩余秘密信息的位数小于所述第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段中的m位之和,将剩余秘密信息按照所述剩余秘密信息的数据位顺序依次替换第二排列段中除第一个数据包之外的其他数据包的TCP序列号字段的相等位数信息,并将第二排列段中的数据包中未替换为秘密信息的其他字段中的信息用填补信息替换。
PCT/CN2021/129583 2020-11-23 2021-11-09 一种融合型隐蔽信道的构建方法及系统 WO2022105645A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US17/907,398 US20230275880A1 (en) 2020-11-23 2021-11-09 Method and system for constructing fusion covert channel
ZA2022/05993A ZA202205993B (en) 2020-11-23 2022-05-30 Fusion covert channel construction method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011317532.XA CN112291267B (zh) 2020-11-23 2020-11-23 一种融合型隐蔽信道的构建方法及系统
CN202011317532.X 2020-11-23

Publications (1)

Publication Number Publication Date
WO2022105645A1 true WO2022105645A1 (zh) 2022-05-27

Family

ID=74425064

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/129583 WO2022105645A1 (zh) 2020-11-23 2021-11-09 一种融合型隐蔽信道的构建方法及系统

Country Status (4)

Country Link
US (1) US20230275880A1 (zh)
CN (1) CN112291267B (zh)
WO (1) WO2022105645A1 (zh)
ZA (1) ZA202205993B (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132425A (zh) * 2022-12-27 2023-05-16 中国电子科技集团公司第三十研究所 一种大规模多路数据跨网单向导入方法及系统
CN116192480A (zh) * 2023-02-06 2023-05-30 唐山学院 一种物联网环境隐通道的构建方法及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291267B (zh) * 2020-11-23 2021-08-31 唐山学院 一种融合型隐蔽信道的构建方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6917974B1 (en) * 2002-01-03 2005-07-12 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for preventing network traffic analysis
CN110690942A (zh) * 2019-09-05 2020-01-14 南京理工大学 基于lte协议的网络隐信道构建方法
CN110838913A (zh) * 2019-11-26 2020-02-25 华侨大学 一种基于秘密共享的时间式网络隐蔽信道检测方法
CN112291267A (zh) * 2020-11-23 2021-01-29 唐山学院 一种融合型隐蔽信道的构建方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103138913A (zh) * 2013-02-25 2013-06-05 南京理工大学常熟研究院有限公司 基于时间隐蔽信道的光纤网加密通信系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6917974B1 (en) * 2002-01-03 2005-07-12 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for preventing network traffic analysis
CN110690942A (zh) * 2019-09-05 2020-01-14 南京理工大学 基于lte协议的网络隐信道构建方法
CN110838913A (zh) * 2019-11-26 2020-02-25 华侨大学 一种基于秘密共享的时间式网络隐蔽信道检测方法
CN112291267A (zh) * 2020-11-23 2021-01-29 唐山学院 一种融合型隐蔽信道的构建方法及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132425A (zh) * 2022-12-27 2023-05-16 中国电子科技集团公司第三十研究所 一种大规模多路数据跨网单向导入方法及系统
CN116132425B (zh) * 2022-12-27 2024-03-26 中国电子科技集团公司第三十研究所 一种大规模多路数据跨网单向导入方法及系统
CN116192480A (zh) * 2023-02-06 2023-05-30 唐山学院 一种物联网环境隐通道的构建方法及系统
CN116192480B (zh) * 2023-02-06 2023-10-10 唐山学院 一种物联网环境隐通道的构建方法及系统

Also Published As

Publication number Publication date
CN112291267B (zh) 2021-08-31
CN112291267A (zh) 2021-01-29
ZA202205993B (en) 2022-08-31
US20230275880A1 (en) 2023-08-31

Similar Documents

Publication Publication Date Title
WO2022105645A1 (zh) 一种融合型隐蔽信道的构建方法及系统
JP7042875B2 (ja) セキュア動的通信ネットワーク及びプロトコル
USRE49053E1 (en) System and method for an adaptive TCP SYN cookie with time validation
Ahsan Covert channel analysis and data hiding in TCP/IP
Zander et al. Covert channels and countermeasures in computer network protocols [reprinted from ieee communications surveys and tutorials]
Zander et al. Covert channels in the IP time to live field
JP2020516198A (ja) ハイパーセキュアラストマイル通信の方法及び装置
US7987369B2 (en) Using watermarking to reduce communication overhead
CN110035047B (zh) 用于检查数据包中的消息完整性的轻型机制
RU2437239C1 (ru) Способ и устройство для формирования параметра криптосинхронизации
US20070143598A1 (en) Means of mitigating denial of service attacks on IP fragmentation in high performance IPsec gateways
WO2017148419A1 (zh) 数据传输方法及服务器
CN111194541A (zh) 用于数据传输的装置和方法
Frikha et al. Implementation of a Covert Channel in the 802.11 Header
Schmidbauer et al. Sok: A survey of indirect network-level covert channels
Amponis et al. 5G core PFCP intrusion detection dataset
Trabelsi et al. Covert file transfer protocol based on the IP record route option
CN110602110A (zh) 一种全网端口隔离方法、装置、设备及存储介质
Mazurczyk et al. Steganography in handling oversized IP packets
Shoket et al. Secure VOIP LTE network for secure transmission using PLRT (Packet Level Restraining Technique) under DDOS Attack
CN114040389B (zh) 一种适用于物联网应用场景的高速安全传输方法
Dakhane et al. Detection and elimination of covert communication in transport and internet layer-A Survey
Kundu Mitigation of Storage Covert Channels in IPSec for QoS Aware Applications
Noisternig Cryptographic transforms for a lightweight and efficient DVB link-layer security extension
JP2005065004A (ja) 暗号化通信データ検査方法、暗号化通信データ検査装置及び暗号化通信データ検査プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21893792

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21893792

Country of ref document: EP

Kind code of ref document: A1