Time-type network covert channel detection method based on secret sharing

A covert channel and secret sharing technology, applied in the field of network information security, can solve the problems of low detection efficiency and achieve the effect of improving robustness and high robustness

Active Publication Date: 2020-02-25
HUAQIAO UNIVERSITY
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The detection method of information entropy and conditional correction entropy is currently recognized as one of the most effective detection methods, which can detect most of the temporal network covert channels, but this detection method is easily affected by the sample size of the covert channel data, that is, in the covert channel The detection efficiency is very low when the channel data samples are small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-type network covert channel detection method based on secret sharing
  • Time-type network covert channel detection method based on secret sharing
  • Time-type network covert channel detection method based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0098] This embodiment is applicable to real network traffic transmission scenarios, and the present invention can be implemented by a time-based network covert channel detection device, which specifically includes the following steps:

[0099] Step 1: Under the Windows 10 operating system, use Pycharm and Wireshark software to build a detection platform for temporal network covert channels based on secret sharing to detect the existence of temporal network covert channels. In this example, the current network protocol that mainly occupies network data traffic—HTTP network traffic is selected as the carrier of the covert channel. In different embodiments, different network protocols may be selected as the transmission carrier of the covert channel.

[0100] Step 2: Use Wireshark software to capture the HTTP network traffic in transmission, extract the inter-packet delay IPD through the time stamp of the network traffic, and use the phase space reconstruction method to divide t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a time-type network covert channel detection method based on secret sharing, which fully analyzes the communication characteristics of various types of time-type network covert channels and extracts robust channel intrinsic characteristics by preprocessing network flows. A channel is segmented by using a phase space reconstruction method to take the local time slot characteristics of the channel as sub secrets. A channel global entropy feature is used as a weight. A channel identifier is constructed by using a secret reconstruction strategy in a threshold secret sharing principle, mapping of channel features to the channel identifier is realized, traditional cryptography and network time hidden channel detection are well combined together, and the robustness of thedetection method is improved while the detection rate is ensured.

Description

technical field [0001] The invention relates to the technical field of network information security, more specifically, to a time-based network covert channel detection method based on secret sharing. Background technique [0002] With the development of the international information industry, traditional paper materials are replaced by digital media materials. In the network information world, the information carried by these digital media materials can be accessed, shared and processed through the network. While bringing great convenience to people, security issues such as information leakage and network attacks are also becoming more and more prominent. As a kind of steganographic technology, network covert channel makes it extremely easy to leak secret information (such as national, military secrets, personal privacy and commercial secrets, etc.), causing great network threats and hidden dangers. [0003] There are many classification methods for covert channels. Curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/085H04L9/002
Inventor 陈永红谢锦璞王哲王林帆
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products