Unlock instant, AI-driven research and patent intelligence for your innovation.

Secret data transmission method based on multi-communication link transmission model

A data transmission method and communication link technology, applied in the field of covert data transmission, can solve problems such as lack of detection resistance, and achieve the effect of high practical value and strong detection resistance

Inactive Publication Date: 2017-09-08
JIANGSU UNIV OF SCI & TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, although this method is novel, it does not have good anti-detection performance. The latest research shows that using detection algorithms based on information entropy, conditional entropy, and K-L can detect stegblock-TCP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret data transmission method based on multi-communication link transmission model
  • Secret data transmission method based on multi-communication link transmission model
  • Secret data transmission method based on multi-communication link transmission model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] A concealed data transmission method based on multiple communication link transmission models in this embodiment comprises the following steps: (1) establishing a Markov attribute model library in the transmission process of multiple links; (2) implementing concealment data transmission.

[0045] The process of building a Markov model library is as follows: figure 2 As shown, it specifically includes the following steps:

[0046] (1) Set the data capture device: set up multi-link link between two hosts, and utilize the data capture device to capture the data packet when communicating between the hosts, in this embodiment, capture two by wireshark as the data capture device Normal multi-link communication data between hosts, and then use the built-in filter of wireshark to filter out the arrival sequence of data packets.

[0047] (2) Set the identifier converter: establish an identifier converter according to the principle of stegblock, and assign different identifier...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret data transmission method based on a multi-communication link transmission model. The method comprises the steps of 1, building a Markov attribute model library included in a multi-link transmission process; and 2, implementing secret data transmission. According to the method provided by the invention, the statistical distribution of secret data is extremely similar to normal data by fitting Markov model codes of normal multi-link communication based on stegblock-TCP, without changing data packet structures, stream attributes and application structures. Compared with the traditional stegblock-TCP, the method provided by the invention is stronger in detection resistance and higher in application value.

Description

technical field [0001] The invention belongs to the technical field of network and information security, and in particular relates to a concealed data transmission method based on a transmission model of multiple communication links. Background technique [0002] With the rapid development of computer networks, network services are becoming more and more diverse, and the resulting information security issues have attracted widespread attention. Network covert communication is a special network communication mechanism, which uses normal network flow as the carrier, and can ignore system policy settings and transmit sensitive data between different entities. Compared with traditional covert communication technology, the security of network covert communication is higher. [0003] Covert communication based on multi-link transmission coding is a new covert communication method, in 2015, Wojciech and Krzysztof Szczypiorski proposed the concept of stegblock. First, select som...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04B17/391H04B17/382H04L29/06H04L12/26
CPCH04B17/391H04B17/382H04L43/04H04L63/0428H04L69/163
Inventor 翟江涛李萌朱成名徐心怡
Owner JIANGSU UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More