• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hou Bowen, Guo Hongbin, Shi Leyi. File Covert Transfer Strategy Based on End Hopping and Spreading[J]. Journal of Computer Research and Development, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420
Citation: Hou Bowen, Guo Hongbin, Shi Leyi. File Covert Transfer Strategy Based on End Hopping and Spreading[J]. Journal of Computer Research and Development, 2020, 57(11): 2283-2293. DOI: 10.7544/issn1000-1239.2020.20200420

File Covert Transfer Strategy Based on End Hopping and Spreading

Funds: This work was supported by the National Natural Science Foundation of China (61772551) and the Natural Science Foundation of Shandong Province of China (ZR2019MF034).
More Information
  • Published Date: October 31, 2020
  • The end hopping and spreading technology is an active defense technology that pseudorandom changes the end information in the end to end data transmission and uses the end spreading sequence to realize high-speed synchronous authentication. In this paper, the end hopping and spreading technology is introduced into file covert transfer, the file covert transmission strategy under the end hopping and spreading network is studied, the multicast time correction scheme is proposed, and the synchronization problem in communication process is solved. Two kinds of file transfer schemes based on time transfer and transmission size transfer are proposed for the end hopping and spreading network, and the data migration is added into the file transfer process to realize the covert transmission and integrity transmission of files. A prototype system is designed and implemented for the file covert transfer of end hopping and spreading, and the usability and security are tested. The experimental results show that the file covert transfer strategy can effectively meet the requirements for the integrity and concealment of file transfer.
  • Related Articles

    [1]Wu Xian, Tang Hongbo, Zhao Yu, Xu Mingyan. A Cross-Cluster Real-Time Migration Method for Stateful Container[J]. Journal of Computer Research and Development, 2024, 61(2): 494-502. DOI: 10.7544/issn1000-1239.202220602
    [2]Lu Liang, Yu Jiong, Bian Chen, Liu Yuechao, Liao Bin, Li Huijuan. A Task Migration Strategy in Big Data Stream Computing with Storm[J]. Journal of Computer Research and Development, 2018, 55(1): 71-92. DOI: 10.7544/issn1000-1239.2018.20160812
    [3]Huang Dongmei, Du Yanling, and He Qi. Migration Algorithm for Big Marine Data in Hybrid Cloud Storage[J]. Journal of Computer Research and Development, 2014, 51(1): 199-205.
    [4]Zhang Guangyan, amd Qiu Jianping. An Approach for Migrating Data Adaptively in Hierarchical Storage Systems[J]. Journal of Computer Research and Development, 2012, 49(8): 1804-1810.
    [5]Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan. Fast and Live Whole-System Migration of Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(3): 661-668.
    [6]Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin. A Mapping Algorithm for Replicated Data in LargeScale Storage System[J]. Journal of Computer Research and Development, 2009, 46(3): 492-497.
    [7]Xu Yun, Yan Bingfeng, Chen Guoliang. Core Management and Algorithms in All-to-All Multicast[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Shi Xuelin, Zhang Zhaoqing, and Wu Chenggang. Mapping Cobol Data to Java Type System with Functional Equivalence[J]. Journal of Computer Research and Development, 2006, 43(2): 336-342.
    [9]Zhong Hairong, Liu Xiaojian, and Jin Shiyao. Migrating Entities and Their Time Synchronization Issue in Large-Scale Federated Simulation (Part Two): Time Synchronization for Migrating Entities[J]. Journal of Computer Research and Development, 2005, 42(4): 716-720.
    [10]Liu Xiaojian, Zhong Hairong, and Jin Shiyao. Migrating Entities and Their Time Synchronization Issue in Large-Scale Federated Simulation (Part One): Protocol and Implementation for Migrating Entities[J]. Journal of Computer Research and Development, 2005, 42(4): 711-715.
  • Cited by

    Periodical cited type(2)

    1. 程晓蕾,邓惠俊. 移动平台终端隐蔽信道数据传输同步方法. 咸阳师范学院学报. 2022(06): 28-33 .
    2. 石乐义,兰茹,段鹏飞,韩强. 基于SCMA的端信息扩展多用户安全通信系统研究. 计算机研究与发展. 2021(11): 2444-2455 . 本站查看

    Other cited types(4)

Catalog

    Article views (688) PDF downloads (296) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return