Method and device for constructing covert channel based on ZeroNet

A covert channel and related information technology, applied in the field of information hiding, can solve the problems of channel fragility and single point failure

Active Publication Date: 2020-01-17
北京丁牛科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a method and device for constructing a covert channel based on ZeroNet, which is used to solve the single-point failure caused by the use of centr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for constructing covert channel based on ZeroNet
  • Method and device for constructing covert channel based on ZeroNet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] The above description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the invention. Therefore, the present invention will not be limited to the embodiments shown herein...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing a covert channel based on ZeroNet, and the method comprises the steps: judging whether a user host is a target controlled host or not when the condition that the user host accesses a target main control website is detected, and enabling the target main control website to be constructed according to a ZeroNet program; wherein a ZeroNet program is installed in the target controlled host; if the user host is a target controlled host, issuing a command to the target controlled host; enabling the target controlled host to receive the command and execute the command; and after the command is executed, receiving related information fed back by the target controlled host. In the above method, constructing a target master control website by adoptinga ZeroNet program; according to the method, the command is sent to the controlled host provided with the ZeroNet, a centralized channel is not needed, and a peer-list center node of a hard code doesnot need to be initialized and accessed, so that the problem that the channel becomes fragile due to a single-point failure defect and peer-list failure is avoided.

Description

technical field [0001] The invention relates to the technical field of information hiding, in particular to a method and device for constructing a covert channel based on ZeroNet. Background technique [0002] Command and Control (C&C for short) channel is a kind of covert channel, generally used for remote control, file transfer, etc. More and more studies have proved that command and control channel plays an important role in botnet and APT attacks . Studying the command and control channel can better prevent botnet and APT attacks, understand the command and control mechanism, efficiently monitor such attacks, detect and stop them in time, and reduce the harm of such attacks. [0003] The current mainstream command and control technologies include centralized structure and peer-to-peer P2P (peer to peer) structure. The centralized structure includes IRC protocol technology and HTTP protocol technology. In the IRC protocol technology, the controller can use the free pub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/18H04L63/20
Inventor 王忠儒余伟强姜海
Owner 北京丁牛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products