Font Size: a A A

Network Covert Channel Detection Technology Research

Posted on:2013-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:X J WuFull Text:PDF
GTID:2218330371459773Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
The covert channel technology has been subject to the attention of the national military and security sector. The commercial, social groups are also very concerned about it. With the rapid development of computer network technology, network covert channel technology has become a new hotspot. It's more convenient to build a network of covert channels by which more information is leaked. That also increased the difficulty of the network covert channels detection. Research of the network covert channel detection technology will reduce its harm and play the role of a deterrent for hackers and terrorists who use it. And it also helps us to better understanding of the communication technology which can be used in a number of positive occasions to serve our lives. After investigating the status of covert channel, this paper has completed the following work:(1) A network of covert channel platform is constructed with five typical network covert channels which cover the main type of covert channel.(2) On this basis, a network of covert channel detection method using the OPTICS clustering is proposed to identify network covert channels.(3) With data set extracted form network covert channel research platform, operating results are tested under the conditions of a single covert channels as well as variety of covert channels and detection rate, the recognition rate and false alarm rate are demonstrate, too.The results show that the ideal testing conditions for the existence of single or multiple network covert channels detection. The detection algorithm has a higher run rate, a good network covert communication data within a certain rangerecognition rate and false alarm rate. Thus, the subject of research in the field of network security has important theoretical and practical significance.
Keywords/Search Tags:network security, information hide, covert channel, OPTICS cluster
PDF Full Text Request
Related items