一种针对BitTorrent协议中have消息的隐写分析方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Steganalysis method for have message in BitTorrent protocol
  • 作者:徐心怡 ; 翟江涛 ; 戴跃伟
  • 英文作者:Xu Xinyi;Zhai Jiangtao;Dai Yuewei;School of Electronics & Information,Jiangsu University of Science & Technology;
  • 关键词:BitTorrent网络 ; 网络隐写分析 ; 信息安全
  • 英文关键词:BitTorrent network;;network steganalysis;;information security
  • 中文刊名:JSYJ
  • 英文刊名:Application Research of Computers
  • 机构:江苏科技大学电子信息学院;
  • 出版日期:2018-02-09 11:16
  • 出版单位:计算机应用研究
  • 年:2019
  • 期:v.36;No.329
  • 基金:国家自然科学基金资助项目(61702235,61602247,U1636117,61472188);; 江苏省自然科学基金资助项目(BK20150472,BK20160840);; CCF-启明星辰“鸿雁”科研基金资助项目(2016011)
  • 语种:中文;
  • 页:JSYJ201903056
  • 页数:4
  • CN:03
  • ISSN:51-1196/TP
  • 分类号:285-287+291
摘要
网络隐写是一种以计算机网络通信数据为载体的隐蔽通信技术。BitTorrent协议的巨大流量使其成为一种极佳的隐写载体,基于BitTorrent协议have消息的隐写即在此背景下提出,目前公开文献尚无有效的检测算法。基于此,提出了一种基于多特征分类的检测方法。该方法首先提取正常have消息数据流,接着提取均值、方差与直方图特征,最后基于AdaBoost分类器给出了检测结果。实验结果表明,所提方法在观测窗口达到1 000个数据包时对该隐写的识别正确率可达96%,在检测基于have消息的隐写时具有良好效果。
        Network steganography is a kind of computer network communication data as the carrier of the hidden communication technology. BitTorrent protocol of the huge flow makes it an excellent steganographic carrier,based on BitTorrent protocol it proposed the steganography of have message in this context,there is no effective detection algorithm in current public literature. Based on this,this paper presented a multi-feature classification based on the detection method. Firstly,it extracted the method from the normal data stream,then it generated the secret data according to the concealed method,and then extracted the normal data and the dense data. Finally,it gave the detection result based on the AdaBoost classifier. The experimental results show that the accuracy of the proposed method can reach 96% when the observation window reaches 1 000 packets,it has good effect in detecting steganography based on have messages.
引文
[1] Fridrich J.数字媒体中的隐写术[M].张涛,奚玲,张彦,等译.北京:国防工业出版社,2014:2-9.(Fridrich J. Steganography indigital media[M]. Zhang Tao,Xi Ling,Zhang Yan,et al. Beijing:National Defense Industry Press,2014:2-9.)
    [2] Wendzel S,Zander S,Fechner B,et al. Pattern-based survey andcategorization of network covert channel techniques[J]. ACM Com-puting Surveys,2015,47(3):article No. 50.
    [3] Elzbieta Z,Wojcjech M,Krzysztof S,et al. Trends insteganography[J]. Communications of the ACM,2014,57(3):86-95.
    [4] Rios R,Onieva J A,Lopez J. Covert communications through net-work configuration messages[J]. Computers&Security,2013,39(4):34-46.
    [5] Kiyavash N,Koushanfar F,Colemant P,et al. A timing channel spy-ware for the CSMA/CA protocol[J]. IEEE Trans on InformationForensics&Security,2013,8(3):477-487.
    [6]吕晓鹏,王文东,龚向阳,等.混合网中的P2P资源共享机制[J].北京邮电大学学报,2011,34(4):113-117.(Lyu Xiao-peng,Wang Wendong,Gong Xiangyang,et al. P2P resource sharingmechanism in hybrid network[J]. Journal of Beijing University ofPosts and Telecommunications,2011,34(4):113-117.)
    [7]徐钒文.基于P2P的隐蔽匿名通信技术研究[D].北京:北京邮电大学,2012:4-51.(Xu Fanwen. Research on covert anony-mous communication technology based on P2P[D]. Beijing:BeijingUniversity of Posts and Telecommunications,2012:4-51.)
    [8] Cunche M,Kaafar M A,Boreli R. Asynchronous covert communica-tion using BitTorrent trackers[C]//Proc of International Conferenceon High Performance Computing and Communications. Piscataway,NJ:IEEE Press,2014:213-291.
    [9] Praviya B B S,Priyanka S S,Thamarai S V. Hiding of data usingsteganography technique[J]. International Journal of EngineeringSciences&Research Technology,2015,4(2):78-81.
    [10]Lampson B W. A note on the confinemeng problem[J]. Communi-cations of the ACM,1973,16(10):613-615.
    [11]Desimine J,Johnson D,Yuan B,et al. Covert channel in the BitTorrent tracker protocol[C]//Proc of International Conference on Se-curity and Management. New York:Rochester Institute of Technolo-gy,2012:223-226.
    [12]李自帅,孙兴明,王宝威,等.一种对等网中的隐写方案[C]//智能信息隐藏与多媒体信号处理国际会议. 2008:20-24.(LiZishuai,Sun Xingming, Wang Baowei, et al. A steganographyscheme in peer-to-peer networks[C]//Proc of Intelligent Informationhiding and Multimedia Signal Processing International Conference.2008:20-24.)
    [13] Desimone J,Johnson D,Yuan B. Covert channel in the BitTorrenttracker protocol[EB/OL].(2012). http://scholarworks. rit. edu/other/300.
    [14]李子帅.基于BitTorrent网络的信息隐藏技术研究[D].长沙:湖南大学,2009.(Li Zishuai. Research on information hiding tech-nology based on BitTorrent network[D]. Changsha:Hunan Universi-ty,2009.)
    [15]Zhang Lihua,Liu Guangjie,Zhai Jiangtao,et al. Improving reliabili-ty of covert timing channel to packet loss[J]. Journal of Informa-tion Hiding&Multimedia Signal Processing,2015,6(3):544-553.
    [16]高斌,翟江涛,戴跃伟.基于Bit Torrent协议have消息的信息隐藏方法[J].计算机应用,2017,37(1):200-205.(Gao Bin,Zhai Jiangtao,Dai Yuewei. Information hiding method based on BitTorrent protocol have message[J]. Journal of Computer Applica-tions,2017,37(1):200-205.)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700