Font Size: a A A

Research On Covert Channel Technology In IPv4/IPv6 Dual Stack Environment

Posted on:2022-01-14Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhangFull Text:PDF
GTID:2518306557477754Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the widespread application of IPv6,it is foreseeable that IPv4 and IPv6 will be in a state of coexistence for a long time in the future,which makes various security problems appear in the dual-stack protocol where IPv4 and IPv6 coexist.To solve the problem of the transition from IPv4 to IPv6,dual-stack technology,tunneling technology,and conversion technology are currently proposed,but the introduction of these mechanisms will bring more complex problems to network security,so the hidden channel problem in the dual-stack environment has also become Problems to be solved.Most of the existing network covert channels are based on a single network protocol.The disadvantage of this type of network covert channels is that the covert communication bandwidth is small and the privacy is poor.Many scholars have proposed a network covert channel based on multiple protocols,which increases the bandwidth of covert communication,but the security of covert communication has not improved.Based on the existing network covert channel research,this paper introduces a storage covert channel during the transition from IPv4 to IPv6,and designs a network covert channel model based on the dual-stack protocol.This model takes the dual-stack network protocol as the carrier,and improves the security,reliability and robustness of the covert communication through the method of constructing the covert channel of the dual-protocol network.This paper introduces the frequency hopping(Frequency Hopping)idea in the communication field,and proposes a dual-protocol-based Network Covert Channel-SC-TL model,which improves the confidential communication under the premise of ensuring the bandwidth of the network covert channel Security.This model divides the secret information into multiple segments,and each segment of secret information is hidden and transmitted using the protocol-based network covert channel method;using the frequency hopping algorithm,the bearer protocol is randomly switched between IPv4 and IPv6 network protocols,and the next segment of secret information is transmitted.In this paper,a secret transmission protocol and response mechanism are designed to enable both sender and receiver to efficiently transmit secret information;an error control mechanism is designed to ensure the integrity and correctness of the secret information,and automatic error detection and error retransmission are realized.After testing,the SC-TL model has reached the expected design goal.Without affecting the statistical characteristics of the network protocol,it has improved the confidentiality and reliability of the secret information transmitted by the network covert channel,and has good application value.
Keywords/Search Tags:Covert channel, Information hiding, Dual stack protocol, Synchronization
PDF Full Text Request
Related items