• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
CAI Zhi-yong, ZHANG Xing, SHEN Chang-xiang. Analysis and Detection of Covert Information Transfers in MLS Network[J]. Journal of Beijing University of Technology, 2011, 37(8): 1226-1230.
Citation: CAI Zhi-yong, ZHANG Xing, SHEN Chang-xiang. Analysis and Detection of Covert Information Transfers in MLS Network[J]. Journal of Beijing University of Technology, 2011, 37(8): 1226-1230.

Analysis and Detection of Covert Information Transfers in MLS Network

More Information
  • Received Date: July 06, 2009
  • Available Online: November 18, 2022
  • Regarding the issue of network covert channels hidden in overt sources with fixed probability distribution,two detection methods are proposed.One is an improved attribute shift test and the other is a modified Pearson chi-square test.In attribute shift test we use k warnings instead of one warning to indicate detection.In chi-square test we incorporate adjacent probability values.The two methods improve detection accuracy in different degrees.Advantages of the detection methods are verified by experiments.
  • [1]
    GIRLING C G.Covert channels in LAN’s[J].IEEE Transactions on Software Engineering,1987,13(2):292-296.
    [2]
    YAO Li-hong,ZI Xiao-chao,PAN Li,et al.A study of on/off timing channel based on packet delay distribution[J].Computers and Security,2009,28(8):785-794.
    [3]
    RONALD W S,GEORGE S K.Predictable design of network-based covert communication systems[C]∥Symposium onSecurity and Privacy.Oakland,CA:IEEE,2008:311-321.
    [4]
    ZOUHEIR T,WASSIME H,SAFUATH.Implementation of an ICMP-based covert channel for file and message transfer[C]∥15th IEEE International Conference on Electronics,Circuits and Systems.Saint-Julien:IEEE,2008:894-897.
    [5]
    胡文涛,薛质,陈楠.基于网络计数器的隐蔽信道[J].上海交通大学学报,2008,42(10):1678-1681.HU Wen-tao,XUE Zhi,CHEN Nan.Research of covert channels based on Web counters[J].Journal of Shanghai JiaotongUniversity,2008,42(10):1678-1681.(in Chinese)
    [6]
    SERDAR C,CARLA E B,CLAY S.IP covert timing channels:design and detection[C]∥Proceedings of the 11th ACMConference on Computer and Communications Security.Washington,D.C.:ACM,2004:178-187.
    [7]
    LUO Xia-pu,EDMOND W W C,ROCKY K C C.TCP covert timing channels:design and detection[C]∥InternationalConference on Dependable Systems&Networks.Anchorage Alaska:IEEE,2008:420-429.
    [8]
    SEBASTIAN Z,GRENVILLE A,PHILIP B.A survey of covert channels and counter-measures in computer network protocols[J].IEEE Communications Surveys&Tutorials,2007,9(3):44-57.
    [9]
    CAI Zhi-yong,ZHANG Yong.Integrated covert channel countermeasure model in MLS networks[C]∥InternationalConference on Information Engineering and Computer Science.Wuhan:ICIECS,2009:3755-3758.
    [10]
    范大茵,陈永华.概率论与数理统计[M].2版.杭州:浙江大学出版社,2003:40-201.
  • Related Articles

    [1]LI Hou-jun, LI Yu-jian, XIE Huan-xi. Quasi Haar Transform Template Matching Algorithm[J]. Journal of Beijing University of Technology, 2014, 40(2): 278-284.
    [2]WEI Rui-ju, WU Bin, ZHANG Xiao-ping, ZHAO Huan-yu, HE Cun-fu. Acoustic Band Gaps on Two-dimensional Triangular Lattice Phononic Crystal With Elliptical Cylinders[J]. Journal of Beijing University of Technology, 2012, 38(8): 1125-1129.
    [3]HU Yue, GAO Xiao-yu, GAO Qing-shi. Imitated Geometric Transformation Function in United Linguistics[J]. Journal of Beijing University of Technology, 2008, 34(8): 891-896.
    [4]LI Gao-rong, CHEN Shuang, XUE Liu-gen. A Class of Strong Law for the Sequences for Continuous Random Variable and the Approach of Laplace Transform[J]. Journal of Beijing University of Technology, 2007, 33(7): 751-756.
    [5]JIN Cai-yun, CHENG Cao-zong. Minimax Theorem of Two Mixed Functions[J]. Journal of Beijing University of Technology, 2006, 32(3): 269-273.
    [6]LIU Bo, ZHANG Hong-bin. Scalable Mesh Coding Based on Wavelet Transform[J]. Journal of Beijing University of Technology, 2004, 30(1): 63-67.
    [7]Tu Chenyuan, Tu Chengyu. Topological Transformation of Knowledge Models[J]. Journal of Beijing University of Technology, 1994, 20(3): 57-58.
    [8]Rao Qing, Bai Shixian. A Method of Interference Detection and Its Geometric Meaning[J]. Journal of Beijing University of Technology, 1994, 20(2): 96-104.
    [9]Yu Shanqi. The Precise Formulas of Single Sampling Inspection by Variables with Two-Sided Constraint[J]. Journal of Beijing University of Technology, 1993, 19(2): 68-73.
    [10]Yu Shanqi. The Theory and Application of Single Sampling Inspection by Variables with Two-Sided Constraint[J]. Journal of Beijing University of Technology, 1992, 18(3): 33-40.

Catalog

    Article views (13) PDF downloads (5) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return