ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2016, Vol. 53 ›› Issue (5): 988-999.doi: 10.7544/issn1000-1239.2016.20150063

• 信息安全 • 上一篇    下一篇



  1. (江苏大学计算机科学与通信工程学院 江苏镇江 212013) (
  • 出版日期: 2016-05-01
  • 基金资助: 

Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis

Wang Changda, Huang Lei, Liu Zhifeng   

  1. (School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, Jiangsu 212013)
  • Online: 2016-05-01

摘要: 隐通道(亦称隐蔽信道)是高等级可信系统评估的重要指标,而以时间作为信息传输载体的工作方式决定了IP时间隐通道在包交换网络中几乎不能被根除.目前,利用IP时间隐通道在网络中实施信息的隐蔽传输没有统一的数学模型,对其研究主要还是依靠实验方式.首先根据时间的物理定义,将IP时间隐通道按工作方式的差异分成不同类别;然后以随机过程为工具,建立了基于定长时隙与包间延迟2种IP时间隐通道的信息隐藏算法模型;最后在此基础上,推导出了其带宽和误码率与相关网络环境参数的函数关系,并对可获取的有效隐蔽通信带宽与网络噪声的影响进行了一般性的讨论.实验结果印证了提出的数学模型及其理论分析结果的正确性,由此IP时间隐通道的研究可以从主要依靠实验转化为形式化分析与实验验证相结合.

关键词: IP时间隐通道, 信息隐藏算法, 带宽, 误码率, 鲁棒性

Abstract: Covert channel analysis is one of the mandatory requirements of high-level trust evaluations. That IP covert timing channels utilize “time” as media to carry messages makes the eradication of IP covert timing channels on packets-switched networks, which is almost impossible. Hitherto, lack of a general mathematical model makes IP covert timing channels to be a tough job by which implement anonymous communication or information hiding among packets flows. As a result, in the past a few years, most of related works depended on the experiments and observations only. Based on the physical definition of time, IP covert timing channels are categorized as three types according to their different working methods. Furthermore, the mathematical models of IP covert timing channels of fixed-length time slots and inter-packets delays are built through the probability theory, respectively. In addition, the bandwidth function and error rate function of the network parameters for IP covert timing channels are derived. Experimental results show the correctness of the mathematical models as well as the theoretical analysis conclusions in the paper. The models of IP covert timing channels have formed a base on which some of researches in this area can be done through the formal analysis instead of the experimental observations only.

Key words: IP covert timing channel, information hiding algorithm, bandwidth, error rate, robustness