高级检索
    侯博文, 郭宏彬, 石乐义. 基于端信息跳扩混合的文件隐蔽传输策略[J]. 计算机研究与发展, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420
    引用本文: 侯博文, 郭宏彬, 石乐义. 基于端信息跳扩混合的文件隐蔽传输策略[J]. 计算机研究与发展, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420
    Hou Bowen, Guo Hongbin, Shi Leyi. File Covert Transfer Strategy Based on End Hopping and Spreading[J]. Journal of Computer Research and Development, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420
    Citation: Hou Bowen, Guo Hongbin, Shi Leyi. File Covert Transfer Strategy Based on End Hopping and Spreading[J]. Journal of Computer Research and Development, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420

    基于端信息跳扩混合的文件隐蔽传输策略

    File Covert Transfer Strategy Based on End Hopping and Spreading

    • 摘要: 端信息跳扩混合技术是一种在端到端的网络数据传输中伪随机改变端信息,并利用端信息扩展序列实现高速同步认证的主动防御技术.将端信息跳扩混合技术引入文件隐蔽传输,研究了端信息跳扩混合网络环境下的文件隐蔽传输策略,提出组播时间校正方案,解决了通信过程中的同步问题;提出基于时间传输和基于传输大小传输的2种适用于端信息跳扩混合网络环境文件传输方案,并在文件传输过程中增加数据迁移技术,实现文件的隐蔽传输和完整性传输;设计实现端信息跳扩混合文件隐蔽传输原型系统并进行了有效性、安全性测试,实验结果表明:该文件隐蔽传输策略能够有效满足文件传输完整性和隐蔽性要求.

       

      Abstract: The end hopping and spreading technology is an active defense technology that pseudorandom changes the end information in the end to end data transmission and uses the end spreading sequence to realize high-speed synchronous authentication. In this paper, the end hopping and spreading technology is introduced into file covert transfer, the file covert transmission strategy under the end hopping and spreading network is studied, the multicast time correction scheme is proposed, and the synchronization problem in communication process is solved. Two kinds of file transfer schemes based on time transfer and transmission size transfer are proposed for the end hopping and spreading network, and the data migration is added into the file transfer process to realize the covert transmission and integrity transmission of files. A prototype system is designed and implemented for the file covert transfer of end hopping and spreading, and the usability and security are tested. The experimental results show that the file covert transfer strategy can effectively meet the requirements for the integrity and concealment of file transfer.

       

    /

    返回文章
    返回