基于网络协议的隐蔽通道研究与实现The Research and Implementation of Covert Channel Based on Network Protocols
卢大航
摘要(Abstract):
网络隐蔽通道是网络攻击中的一种重要手段,也是评估防火墙和入侵检测系统的防御性能的一种重要技术途径。论文从分析TCP/IP协议的安全缺陷入手,建立了利用网络协议的头结构实现隐蔽通道的通用模型,研究并实现了IP协议和ICMP协议的网络隐蔽通道。
关键词(KeyWords): 网络安全;隐蔽通道;协议
基金项目(Foundation):
作者(Author): 卢大航
Email:
DOI:
参考文献(References):
- 1.JAgat.Transformingouttimingleaks[C].In:27thannualACMsigplan-sigactsymposiumonprinciplesofprograminglanguagesboston,2000
- 2.U.S.DoD.TrustedComputerSystemsEvaluationCriteria.1983
- 3.JHaighetal.Anexperienceusingtwocovertchannelanalysistech-niquesonarealsystemdesign[J].IEEEtransactionsonsoftwareen-gineering,1987;se-13(2)
- 4.BLampsonetal.noteontheconfinementproblem[J].Communican-tionsoftheACM,1993;16(10):613~615
- 5.JMillen.20yearsofcovertchannelmodelingandanalysis[C].In:99'IEEEsecurityandprivacysymposium,113~114
- 6.IraSMoskowitsetal.SimpleTimingChannel[C].In:proceedingsoftheIEEEcomputersocietysymposiumonresearchinsecurityandprivacy,Okaland,CA,1994-05:56~64
- 7.CTsaietal.aformalmethodfortheidentificationofcovertstoragechannelsinsourcecode[C].In:87'IEEEsymposiumonsecurityandprivacy
- 8.RKemmerer.SharedResourceMatrixMethodology:Anapproachtoi-dentifyingstorageandtimingchannel.1983
- 9.JAGoguen,JMeseguer.SecurityPoliciesandSecurityModels[C].In:ProceedingsoftheIEEESymposiumonSecurityandPrivacy,Oak-land,California,1982-04:11~20
- 10.JNe,VDGligor.InformationFlowAnalysisforCovert-ChannelI-dentificationinMultilevelSecureOperatingSystems[C].In:Proceedingsofthe3rdIEEEWorkshoponComputerSecurityFoundations,Fran-conia,NewHampshire,1990-06:139~148
- 11.HoneywellInformationSystemsInc.MulticsSecurityModel-BellandLaPadula,MulticsDesignDocumentMOD-002,Cambridge,Mas-sachusetts,1985-08