Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Time type network covert channel construction method based on discrete wavelet transform

A discrete wavelet transform and construction method technology, applied in the field of network information security, can solve problems such as changing, reducing hidden channel bandwidth, increasing algorithm complexity and transmission overhead, and achieving good anti-detection and good robustness effects

Active Publication Date: 2017-09-29
CHANGZHOU INST OF MECHATRONIC TECH
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing algorithms will generate abnormal data streams or features. The reason is that the embedding of secret messages changes the inherent communication time attributes of normal carrier data streams and increases the probability of detection and analysis by the attacked party.
In addition, in the time-based implicit channel, the synchronization between the two parties is more difficult, because it is easily affected by the unstable network environment, such as delay, jitter and other noise interference.
In order to ensure communication reliability, confirmation mechanisms or error correction codes similar to TCPACKs are generally used at present, but the introduction of these synchronization mechanisms often increases the complexity of the algorithm and transmission overhead, and reduces the bandwidth of the hidden channel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time type network covert channel construction method based on discrete wavelet transform
  • Time type network covert channel construction method based on discrete wavelet transform
  • Time type network covert channel construction method based on discrete wavelet transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] (1) Implementation process of covert communication

[0032] Utilize a kind of temporal covert channel method based on discrete wavelet transform (DWT) proposed by the present invention, the specific covert communication process of both sides is as follows:

[0033] ① Covert communication sender

[0034] Step 1: Under the Windows7 operating system, use Winpcap and Visual C++6.0 software to build an IPD-based covert channel communication platform to capture normal network communication data flow. In this embodiment, the P2P network application currently occupying the main data traffic——YY voice is selected as the carrier application of the covert channel. In different embodiments, other suitable carriers can be selected according to specific situations.

[0035] Step 2: Extract the normal inter-packet delay IPD through the time stamp, and divide the sequence into multiple segments whose length l is 500, record one of the IPD segments as ΔT={Δt 1 ,Δt 2 ,···,Δt 500}. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a time type network covert channel construction method based on discrete wavelet transform, and belongs to the technical field of network information security. According to the time type network covert channel construction method disclosed by the invention, a secret message is embedded in a wavelet domain coefficient of a normal IPD sequence, and the embedding position and intensity are controlled to reduce the time domain changes to the original carrier and the properties of the original carrier as much as possible; and the generated covert communication data streams have normal rules and features and better anti-detection property. Meanwhile, the secret message bits are embedded in a part of approximation coefficients of wavelet decomposition by adopting the odd-even quantification method, and the network noise interference can be resisted to a certain extent without importing additional synchronization cost, and the robustness is relatively good.

Description

technical field [0001] The invention relates to a method for constructing a temporal network hidden channel based on discrete wavelet transform, and belongs to the technical field of network information security. Background technique [0002] The rapid development of computer network technology has brought great convenience to the sharing and transmission of information, but at the same time, security issues such as information leakage and network attacks have become increasingly prominent. The communication process of secret information (such as involving national, military secrets, commercial secrets, personal privacy, etc.) is facing great security threats and hidden dangers. The traditional solution uses cryptography to encrypt information so that the attacker cannot obtain its content, but the messy ciphertext is enough to provide favorable evidence. [0003] As a kind of steganographic technology, network covert channel is a covert communication technology that uses n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04N19/467H04N19/63
Inventor 王茗倩吴红亚宗晓倩左亚旻
Owner CHANGZHOU INST OF MECHATRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products