Font Size: a A A

Analysis And Optimization Of Network Covert Channel Control Protocol

Posted on:2018-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:S H XiaFull Text:PDF
GTID:2428330590477727Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet and network security,covert communication has become an important way of information transmission.The hidden information is hidden in the protocol packet,so that the information transmission is not found by the third party.The control protocol controls the covert communication process and expands the function of covert communication.At the same time,the weakness of the control protocol also makes the covert communication vulnerable to attack.In this paper,the weakness of the existing control protocol is analyzed,and the corresponding weakness attack is proposed.The security design of the protocol is not perfect.We study the network covert channel control protocol.It has good theoretical and practical significance.The control protocol is hidden in the carrier space of the covert communication,which not only occupies the covert channel space,but also has a great influence on the security and detectability of the covert communication.Therefore,it is necessary to design an optimized control protocol for network covert communication.Based on this,this paper proposes a protocol optimization method based on state transformation.Different from the static design of the existing protocol,the method is based on the state of the covert communication,and dynamically organizes the protocol header field,which can effectively reduce the protocol redundancy and the space occupied by the protocol.In addition,the optimized protocol has good expansibility and confidentiality.In this paper,the design method of state transformation is used to optimize the design of Ping Tunnel control protocol,so that the length of the protocol has been greatly improved.Moreover,the method is also applied to the covert channel dynamic routing mechanism,as well as the covert channel in the mobile environment.Research on control protocol of covert channel is a new research direction.At present,there are still many problems to be studied and discussed in this field.The deep hiding method,control protocol interoperability,detection and reverse control protocol,and whether the protocol can be designed as multi-layer protocol are very valuable subjects.At the end of this paper,these aspects were introduced briefly.
Keywords/Search Tags:Network Covert Channel, Control Protocol Weakness, Protocol Optimization, State Transformation, Ping Tunnel
PDF Full Text Request
Related items