Unlock instant, AI-driven research and patent intelligence for your innovation.

Concealed channel detection method, apparatus and device, and storage medium

A covert channel and detection method technology, which is applied in secure communication devices, neural learning methods, biological neural network models, etc., can solve problems such as the inability to meet the needs of SSL covert channel detection and the inability to detect whether there is an SSL covert channel. The effect of detection accuracy

Pending Publication Date: 2022-01-14
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The detection method based on the SSL covert channel in the related art is usually only used to detect whether there is an encrypted Trojan horse in the covert channel, and is detected according to the behavior characteristics of known Trojan horse operations, but cannot detect whether there is an SSL covert channel, that is, the existing technology has Unable to meet the detection requirements of the current SSL covert channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concealed channel detection method, apparatus and device, and storage medium
  • Concealed channel detection method, apparatus and device, and storage medium
  • Concealed channel detection method, apparatus and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0022] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0023] figure 1 It is a flow chart of a method for training a covert channel detection model provided by an embodiment of the present disclosure. The method can be executed by a computing device, and the computing device can be understood as any device with computing functions and processing cap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to a covert channel detection method and device, equipment and a storage medium. According to the embodiment of the invention, the method comprises the steps: obtaining the flow of a client and a server in a handshake stage; performing feature extraction processing on the traffic to obtain features related to a secure socket protocol SSL covert channel; encoding the extracted features to obtain feature vectors corresponding to the features; inputting the feature vector into a preset covert channel detection model, and carrying out SSL covert channel detection based on the covert channel detection model. According to the embodiment of the invention, through the preset covert channel detection model, whether the SSL covert channel exists in the traffic is judged according to the characteristics related to the SSL covert channel in the handshake stage traffic, so that the current requirement on the SSL covert channel detection method is met, and the detection precision can be effectively improved.

Description

technical field [0001] Embodiments of the present disclosure relate to the technical field of computer network security, and in particular, to a covert channel detection method, device, device, and storage medium. Background technique [0002] Network covert channels can easily bypass the detection of firewalls and intrusion detection systems (Intrusion Detection System, IDS) to attack the network. Secure Sockets Layer (SSL) is a protocol based on secure transmission, which uses encryption technology to protect communication content security, ordinary firewalls and network address translation (Network Address Translation, NAT) devices will basically not intercept it, and SSL-based secure hypertext transfer protocol (Hypertext Transfer Protocol Secure, HTTPS) service applications are very popular, so the emergence of A new covert channel using the SSL protocol as the bearer protocol is proposed. [0003] The detection method based on the SSL covert channel in the related art...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08
CPCH04L63/1416G06N3/08G06N3/044
Inventor 邵瑞
Owner BEIJING TOPSEC NETWORK SECURITY TECH