Counterfeit TCP covert communication method based on SYN-ACK dual-server rebound pattern

A covert communication and dual-server technology, applied in the field of information hiding, can solve the problems of unreliable covert communication and low security

Inactive Publication Date: 2013-12-25
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to propose a pseudo-TCP reliable covert communication method based on SYN-ACK double server rebound mode, solve most of the existing problems of unreliable and low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Counterfeit TCP covert communication method based on SYN-ACK dual-server rebound pattern
  • Counterfeit TCP covert communication method based on SYN-ACK dual-server rebound pattern
  • Counterfeit TCP covert communication method based on SYN-ACK dual-server rebound pattern

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0100] In order to fully disclose the content of the present invention, before introducing the specific implementation method of the invention, the working environment of the present invention is firstly introduced. The present invention adopts double-server rebound technology to build a communication channel, and utilizes the establishment stage of the TCP connection between the client and the server to transmit data, and its application scenarios are as follows: image 3 shown. The sending end of described secret information communicates with the receiving end through bounce server A or bounce server B; Embedding concealed information, and embedding the IP address and port of the receiving end of the secret information, the rebound server A bounces the secret information to the receiving end of the secret information for the second time through the confirmation number field of the TCP data packet according to the embedded IP address and port. Handshake; the receiving end of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a counterfeit TCP covert communication method based on an SYN-ACK dual-server rebound pattern. A covert information sending end is in communication with a covert information receiving end through a rebound server A or a rebound server B. A three-way handshake principle of connection is set up through a TCP, and covert information is embedded into a sequence number domain of the TCP and an acknowledgement number domain through a counterfeit source IP address and sent to a target end through rebound of the rebound server A. Meanwhile, the covert information feeds information back to the covert information sending end according to the modification operation of a sequence number and the modification operation of an acknowledge number and through the rebound server B, and the loss detection of the target end and the retransmission timeout of the target end are achieved.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to a pseudo-TCP reliable covert communication method based on a SYN-ACK double-server bounce mode. Background technique [0002] The rapid development of modern network technology makes the transmission of information faster and more convenient, but the transmission security of a large amount of information, especially related to national security, commercial secrets and personal privacy information, has attracted more and more attention. Once this information is leaked, it will bring Serious consequences. In the past, encryption technology was often used to transmit such information, but encryption technology will arouse the attacker's interest in cracking. And with the development of computer hardware, the cracking speed is much faster than before. Information hiding technology provides a good solution to this kind of problem. Information hiding is a tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L1/16
Inventor 黄刘生陆潇榕缪海波沈瑶陈志立杨威
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products