Citation: | CAI Zhi-yong, ZHANG Xing, SHEN Chang-xiang. Analysis and Detection of Covert Information Transfers in MLS Network[J]. Journal of Beijing University of Technology, 2011, 37(8): 1226-1230. |
[1] |
GIRLING C G.Covert channels in LAN’s[J].IEEE Transactions on Software Engineering,1987,13(2):292-296.
|
[2] |
YAO Li-hong,ZI Xiao-chao,PAN Li,et al.A study of on/off timing channel based on packet delay distribution[J].Computers and Security,2009,28(8):785-794.
|
[3] |
RONALD W S,GEORGE S K.Predictable design of network-based covert communication systems[C]∥Symposium onSecurity and Privacy.Oakland,CA:IEEE,2008:311-321.
|
[4] |
ZOUHEIR T,WASSIME H,SAFUATH.Implementation of an ICMP-based covert channel for file and message transfer[C]∥15th IEEE International Conference on Electronics,Circuits and Systems.Saint-Julien:IEEE,2008:894-897.
|
[5] |
胡文涛,薛质,陈楠.基于网络计数器的隐蔽信道[J].上海交通大学学报,2008,42(10):1678-1681.HU Wen-tao,XUE Zhi,CHEN Nan.Research of covert channels based on Web counters[J].Journal of Shanghai JiaotongUniversity,2008,42(10):1678-1681.(in Chinese)
|
[6] |
SERDAR C,CARLA E B,CLAY S.IP covert timing channels:design and detection[C]∥Proceedings of the 11th ACMConference on Computer and Communications Security.Washington,D.C.:ACM,2004:178-187.
|
[7] |
LUO Xia-pu,EDMOND W W C,ROCKY K C C.TCP covert timing channels:design and detection[C]∥InternationalConference on Dependable Systems&Networks.Anchorage Alaska:IEEE,2008:420-429.
|
[8] |
SEBASTIAN Z,GRENVILLE A,PHILIP B.A survey of covert channels and counter-measures in computer network protocols[J].IEEE Communications Surveys&Tutorials,2007,9(3):44-57.
|
[9] |
CAI Zhi-yong,ZHANG Yong.Integrated covert channel countermeasure model in MLS networks[C]∥InternationalConference on Information Engineering and Computer Science.Wuhan:ICIECS,2009:3755-3758.
|
[10] |
范大茵,陈永华.概率论与数理统计[M].2版.杭州:浙江大学出版社,2003:40-201.
|
[1] | LI Hou-jun, LI Yu-jian, XIE Huan-xi. Quasi Haar Transform Template Matching Algorithm[J]. Journal of Beijing University of Technology, 2014, 40(2): 278-284. |
[2] | WEI Rui-ju, WU Bin, ZHANG Xiao-ping, ZHAO Huan-yu, HE Cun-fu. Acoustic Band Gaps on Two-dimensional Triangular Lattice Phononic Crystal With Elliptical Cylinders[J]. Journal of Beijing University of Technology, 2012, 38(8): 1125-1129. |
[3] | HU Yue, GAO Xiao-yu, GAO Qing-shi. Imitated Geometric Transformation Function in United Linguistics[J]. Journal of Beijing University of Technology, 2008, 34(8): 891-896. |
[4] | LI Gao-rong, CHEN Shuang, XUE Liu-gen. A Class of Strong Law for the Sequences for Continuous Random Variable and the Approach of Laplace Transform[J]. Journal of Beijing University of Technology, 2007, 33(7): 751-756. |
[5] | JIN Cai-yun, CHENG Cao-zong. Minimax Theorem of Two Mixed Functions[J]. Journal of Beijing University of Technology, 2006, 32(3): 269-273. |
[6] | LIU Bo, ZHANG Hong-bin. Scalable Mesh Coding Based on Wavelet Transform[J]. Journal of Beijing University of Technology, 2004, 30(1): 63-67. |
[7] | Tu Chenyuan, Tu Chengyu. Topological Transformation of Knowledge Models[J]. Journal of Beijing University of Technology, 1994, 20(3): 57-58. |
[8] | Rao Qing, Bai Shixian. A Method of Interference Detection and Its Geometric Meaning[J]. Journal of Beijing University of Technology, 1994, 20(2): 96-104. |
[9] | Yu Shanqi. The Precise Formulas of Single Sampling Inspection by Variables with Two-Sided Constraint[J]. Journal of Beijing University of Technology, 1993, 19(2): 68-73. |
[10] | Yu Shanqi. The Theory and Application of Single Sampling Inspection by Variables with Two-Sided Constraint[J]. Journal of Beijing University of Technology, 1992, 18(3): 33-40. |