Font Size: a A A

The Design And Implementation Of Distributed Covert Communication System

Posted on:2015-09-20Degree:MasterType:Thesis
Country:ChinaCandidate:L H YangFull Text:PDF
GTID:2298330467463461Subject:Information security
Abstract/Summary:PDF Full Text Request
As information security received more and more attention, experts and scholars in the area of security have put a lot of effort to carry out related research. As an effective means of protecting information’s secure transmission, covert communication technology has been a great concern of researchers and developed rapidly. However, the traditional means of covert communication has been so useless when face of changing hacker’s technology that are unable to offer a secure and covert communication. Therefore, the design and implementation of a more covert and secure system of new covert communication arc of great significance and value for both current application and future research.Research in the field of covert communication is mainly divided into four directions of covert channels, steganography, anonymous communication and digital watermarking. Through the analysis and comparison of existing covert communication technology, we decided to start from covert channels, focusing on the covert communication technology of transmission based on network. According to the new demands of the current covert communication, and combined with the results of previous studies, we proposed a distributed covert communication system.Combined with the proxy technology and the distributed network, and applying a reverse connection technology, we build a kind of distributed proxy communication framework. By using this framework, it effectively protect the true identity of the communicating parties, and has greatly improved the invisibility of covert communication. Considering the performance of distributed network architecture, through the real-time analysis of the load of global nodes, we proposed a dynamic algorithm. The algorithm calculates and selects the most optimal path under the premise of load balance of global nodes, and greatly enhances the communication efficiency of the system. In the process of the specific implementation, we applied with authentication, date encryption and validation, keeping alive and other technical means to further strengthen the security of the system. In addition, the system has drawn up unified interfaces to support multiple protocols for communication, which not only increased the scalability, but also improved the invisibility further.The distributed covert communication system not only has strong concealment and security, but also has a high degree of stability and scalability, and provides a new reference ideas and model for future research and application of covert communication.
Keywords/Search Tags:covert communication, distributed, load balancepath selection
PDF Full Text Request
Related items