Convert communication detection method based on Have message encoding for BitTorrent file sharing process

A technology of message encoding and covert communication, applied in electrical components, transmission systems, etc., can solve the problems such as the detection method of Have message covert communication proposed in no open literature, achieve reliable detection results, and overcome the effect of high false alarm rate.

Active Publication Date: 2017-09-15
JIANGSU UNIV OF SCI & TECH
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there is no public literature proposi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Convert communication detection method based on Have message encoding for BitTorrent file sharing process
  • Convert communication detection method based on Have message encoding for BitTorrent file sharing process
  • Convert communication detection method based on Have message encoding for BitTorrent file sharing process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a schematic diagram of the detection process based on the Bayesian classifier. In this embodiment, for the covert communication detection method based on Have message encoding in the BitTorrent file sharing process, first capture the normal data and the data to be tested, and extract the normal data and the data to be tested respectively. The three characteristics of information entropy, ε similarity and variance, using normal data as training data, and testing data as testing data, input Bayesian classifier (wherein the normal data and testing data are processed in no particular order); the specific process as follows:

[0038] Step 1: Set up the data capturer, use the data capturer to capture normal data, and filter out the Have messages.

[0039] Step 2: Set up the data processor, use the data processor to extract the load in each normal data Have message (the load in the message is a positive integer, and it shows a rising trend), and calculate the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a convert communication detection method based on a Have message encoding for a BitTorrent file sharing process. The method comprises the following steps of capturing normal data and to-be-measured data; respectively extracting three features, namely information entropy, epsilon similarity and a variance, of the normal data and the to-be-measured data; taking the normal data as training data; taking the to-be-measured data as test data to be input into a Bayes classifier; judging whether the to-be-measured data is similar to the normal data through the Bayes classifier, if yes, judging that the to-be-measured data is normal, otherwise judging that the to-be-measured data is abnormal. Through adoption of multi-feature detection of data streams, a problem of high false alarm rate caused by the single feature can be effectively overcome and a reliable detection result is given.

Description

technical field [0001] The invention relates to network and information security technology, in particular to a covert communication detection method based on Have message encoding in the BitTorrent file sharing process. Background technique [0002] As a covert communication method, network steganography uses legal data flow as a carrier to transmit secret information in the network. Governments, enterprises and individuals securely transmit important information by utilizing network covert channels for covert communication. But at the same time, network steganography will also be used by illegal organizations and individuals to transmit harmful information and threaten public safety. Therefore, detecting the existence of network steganography and preventing harm is a crucial link. Steganographic detection technology, as a very important technology in the field of network security protection, has attracted extensive attention of researchers, and has achieved a lot of rese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/30H04L67/06H04L67/104H04L67/1095
Inventor 翟江涛李萌刘伟伟徐留杰
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products