High-security combined covert channel synchronization method

A high-security, covert channel technology, which is applied in the synchronization of network covert channels and the field of high-security combined covert channel synchronization, can solve problems such as ungiven synchronization algorithms, achieve high security, ensure correctness, and guarantee The effect of accuracy

Inactive Publication Date: 2013-09-04
JIANGSU UNIV OF SCI & TECH
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this combined covert channel method can improve the security of the covert channel, because it changes the embedded algorithm of the covert channel during normal data transmission, a synchronization mechanism is needed to ensure that the receiver can correctly extract the covert information.
However, the corresponding synchronization algorithm is not given in Document 7 and other public documents, and the synchronization algorithm is a crucial part of the combined implicit channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security combined covert channel synchronization method
  • High-security combined covert channel synchronization method
  • High-security combined covert channel synchronization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0025] The high-security combined covert channel synchronization method specifically includes the following three parts: a covert channel connection establishment process, a covert data transmission process, and a covert channel connection release process.

[0026] We define the two parties of covert communication as the sender and the receiver, and their states are defined in Table 1. The present invention defines five states of IDLE, ESTABLISH, START, LISTENING, and CLOSED for the sending end an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-security combined covert channel synchronization method. The secrete data transmission accuracy of dual combined covert channel communication parties can be ensured. In a combined covert channel communication process, the dual communication parties modulate synchronization information into a channel under the condition of no changes in normal communication Internet protocol identification (IPID) bit rules. When transmitting secrete information, a transmitting end modulates the synchronization information into an ID bit difference value of an adjacent IP data packet according to a preset modulation method. After receiving a data packet from the transmitting end, a receiving end first extracts values of adjacent IPID bits, then calculates a difference value of the values of the adjacent IPID bits, and solves the secrete information according to a corresponding combined covert channel synchronization mode. According to the synchronization method, own redundancy characteristic of a protocol is fully utilized, and the secrete data transmission and receiving accuracy of a combined covert channel is ensured under the condition of no additionally introduced channels.

Description

technical field [0001] The invention relates to a method for synchronizing network covert channels, in particular to a high-security combined covert channel synchronization method, which belongs to the technical field of communication and information security. Background technique [0002] Network covert channel refers to a covert communication technology that uses normal communication data packets in the network as a carrier to hide secret data in it. In the massive network data flow, the occurrence of network communication is very random and dynamic, and any two computers connected to the network can transmit information through the Internet; and network hidden channels can bypass firewalls, intrusion detection, etc. The security device has the characteristics of strong concealment, making it difficult for the attacker to track and collect evidence. It is these unique properties of the network covert channel that make it become another secure communication method after th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/16H04L29/06
Inventor 翟江涛王茗倩戴跃伟李新亮
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products