• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063
Citation: Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063

Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis

More Information
  • Published Date: April 30, 2016
  • Covert channel analysis is one of the mandatory requirements of high-level trust evaluations. That IP covert timing channels utilize “time” as media to carry messages makes the eradication of IP covert timing channels on packets-switched networks, which is almost impossible. Hitherto, lack of a general mathematical model makes IP covert timing channels to be a tough job by which implement anonymous communication or information hiding among packets flows. As a result, in the past a few years, most of related works depended on the experiments and observations only. Based on the physical definition of time, IP covert timing channels are categorized as three types according to their different working methods. Furthermore, the mathematical models of IP covert timing channels of fixed-length time slots and inter-packets delays are built through the probability theory, respectively. In addition, the bandwidth function and error rate function of the network parameters for IP covert timing channels are derived. Experimental results show the correctness of the mathematical models as well as the theoretical analysis conclusions in the paper. The models of IP covert timing channels have formed a base on which some of researches in this area can be done through the formal analysis instead of the experimental observations only.
  • Related Articles

    [1]Zeng Biqing, Zeng Feng, Han Xuli, Shang Qi. Aspect Extraction Model Based on Interactive Feature Representation[J]. Journal of Computer Research and Development, 2021, 58(1): 224-232. DOI: 10.7544/issn1000-1239.2021.20190305
    [2]Wang Xin, Wang Ying, Zuo Wanli. Exploring Interactional Opinions and Status Theory for Predicting Links in Signed Network[J]. Journal of Computer Research and Development, 2016, 53(4): 764-775. DOI: 10.7544/issn1000-1239.2016.20151079
    [3]Zhu Jun, Guo Changguo, Wu Quanyuan. A Web Services Interaction Behavior-Environment Model Based on Generalized Stochastic Petri Nets[J]. Journal of Computer Research and Development, 2012, 49(11): 2450-2463.
    [4]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [5]Zhu Yingjie, Li Chunpeng, Ma Wanli, Xia Shihong, Zhang Tielin, Wang Zhaoqi. Interaction Feature Modeling of Virtual Object in Immersive Virtual Assembly[J]. Journal of Computer Research and Development, 2011, 48(7): 1298-1306.
    [6]Lu Difei, Ren Wenhua, Li Guojun, and Si Jin. Example Based 3D Animation Creating Interactively[J]. Journal of Computer Research and Development, 2010, 47(1): 62-71.
    [7]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [8]Wu Lingda, Gao Yu, and Wei Yingmei. A Survey of Interactive Rendering of Large-Scale and Complex Scenes[J]. Journal of Computer Research and Development, 2007, 44(9): 1579-1587.
    [9]Wang Xiaochun, Tian Feng, Qin Yanyan, and Dai Guozhong. UPIM: A User-Centered Pen-Based Interactive System[J]. Journal of Computer Research and Development, 2006, 43(8): 1337-1344.
    [10]Liu Wei, ChunTung Chou, Cheng Wenqing, Du Xu. Proxy Caching for Interactive Streaming Media[J]. Journal of Computer Research and Development, 2006, 43(4): 594-600.

Catalog

    Article views (1346) PDF downloads (768) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return