• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
CAI Zhi-yong, ZHANG Xing, SHEN Chang-xiang. Analysis and Detection of Covert Information Transfers in MLS Network[J]. Journal of Beijing University of Technology, 2011, 37(8): 1226-1230.
Citation: CAI Zhi-yong, ZHANG Xing, SHEN Chang-xiang. Analysis and Detection of Covert Information Transfers in MLS Network[J]. Journal of Beijing University of Technology, 2011, 37(8): 1226-1230.

Analysis and Detection of Covert Information Transfers in MLS Network

More Information
  • Received Date: July 06, 2009
  • Available Online: November 18, 2022
  • Regarding the issue of network covert channels hidden in overt sources with fixed probability distribution,two detection methods are proposed.One is an improved attribute shift test and the other is a modified Pearson chi-square test.In attribute shift test we use k warnings instead of one warning to indicate detection.In chi-square test we incorporate adjacent probability values.The two methods improve detection accuracy in different degrees.Advantages of the detection methods are verified by experiments.
  • [1]
    GIRLING C G.Covert channels in LAN’s[J].IEEE Transactions on Software Engineering,1987,13(2):292-296.
    [2]
    YAO Li-hong,ZI Xiao-chao,PAN Li,et al.A study of on/off timing channel based on packet delay distribution[J].Computers and Security,2009,28(8):785-794.
    [3]
    RONALD W S,GEORGE S K.Predictable design of network-based covert communication systems[C]∥Symposium onSecurity and Privacy.Oakland,CA:IEEE,2008:311-321.
    [4]
    ZOUHEIR T,WASSIME H,SAFUATH.Implementation of an ICMP-based covert channel for file and message transfer[C]∥15th IEEE International Conference on Electronics,Circuits and Systems.Saint-Julien:IEEE,2008:894-897.
    [5]
    胡文涛,薛质,陈楠.基于网络计数器的隐蔽信道[J].上海交通大学学报,2008,42(10):1678-1681.HU Wen-tao,XUE Zhi,CHEN Nan.Research of covert channels based on Web counters[J].Journal of Shanghai JiaotongUniversity,2008,42(10):1678-1681.(in Chinese)
    [6]
    SERDAR C,CARLA E B,CLAY S.IP covert timing channels:design and detection[C]∥Proceedings of the 11th ACMConference on Computer and Communications Security.Washington,D.C.:ACM,2004:178-187.
    [7]
    LUO Xia-pu,EDMOND W W C,ROCKY K C C.TCP covert timing channels:design and detection[C]∥InternationalConference on Dependable Systems&Networks.Anchorage Alaska:IEEE,2008:420-429.
    [8]
    SEBASTIAN Z,GRENVILLE A,PHILIP B.A survey of covert channels and counter-measures in computer network protocols[J].IEEE Communications Surveys&Tutorials,2007,9(3):44-57.
    [9]
    CAI Zhi-yong,ZHANG Yong.Integrated covert channel countermeasure model in MLS networks[C]∥InternationalConference on Information Engineering and Computer Science.Wuhan:ICIECS,2009:3755-3758.
    [10]
    范大茵,陈永华.概率论与数理统计[M].2版.杭州:浙江大学出版社,2003:40-201.
  • Related Articles

    [1]WANG Yichen, ZHANG Mingju, LI Liyun, LU Xinyue. Settlement Monitoring and Analysis Method for Building Based on Statistical Process Control[J]. Journal of Beijing University of Technology, 2022, 48(9): 952-960. DOI: 10.11936/bjutxb2021060007
    [2]KONG Deshun, WANG Min, SUN Rui, GAO Xiangsheng. Statistical Analysis of Ball Screw Mechanism Based on an Accelerated Degradation Test[J]. Journal of Beijing University of Technology, 2017, 43(11): 1629-1634. DOI: 10.11936/bjutxb2016090070
    [3]SU Yila, WU Nier, LIU Wanwan. Machine Translation of Mongolianand Chinese Natural Language Based on Statistical Analysis[J]. Journal of Beijing University of Technology, 2017, 43(1): 36-42. DOI: 10.11936/bjutxb2016070044
    [4]CHENG Huan, YANG Xiao-kuan, LIU Xiao-ming. Study on Stated Choice Experiment Design——Application in Travel Choice Analysis[J]. Journal of Beijing University of Technology, 2015, 41(7): 1054-1060. DOI: 10.11936/bjutxb2014110026
    [5]CHEN Jiao, PAN Tian-hong, ZHANG Ming. Outlier Detection Method for Time Series Based on the Rate of Signal Change[J]. Journal of Beijing University of Technology, 2014, 40(7): 992-995.
    [6]MA Min-tao, SUN Lei, HAN Song, ZHANG Yan-yan, WANG Jiang-ping, ZHANG Jing. The Integrated Technology of Spatial Statistical Analysis and Its Application in the Regional Environment[J]. Journal of Beijing University of Technology, 2010, 36(4): 511-516.
    [7]LI Li, CHENG Shui-yuan, CHEN Dong-sheng, ZHAO Xiu-yong. Evaluation of Meteorological Models MM5 With Various Schemes[J]. Journal of Beijing University of Technology, 2010, 36(1): 71-76.
    [8]ZHONG Lian-de, XU Qiu-shi, SUN Xiao-duan, HE Yu-long, CHEN Yong-sheng. Confirmation of Safety Influencing Range of Freeway Interchange[J]. Journal of Beijing University of Technology, 2009, 35(6): 780-784.
    [9]ZHOU Xi-yuan, QI Wei, XU Ping, YAN Wei-ming. Statistical Analysis on the Influence of Magnitude, Distance and Site Condition on Response Spectra[J]. Journal of Beijing University of Technology, 2006, 32(2): 97-103.
    [10]Zhu Yuancheng, Luo Yafei. Test of Goodness of Fit Used in Statistical Survey and Statistical Analysis[J]. Journal of Beijing University of Technology, 1998, 24(z1): 81-85.

Catalog

    Article views (13) PDF downloads (5) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return