期刊文献+

基于协议的拟态研究综述 被引量:3

Protocol mimicry technique and its development
下载PDF
导出
摘要 在网络空间安全领域,一个协议可以把自己伪装成其他协议达到避免被发现或者逃避监管的目的.借鉴生物拟态的机制,提出网络协议拟态系统的技术框架.该框架由协议拟态客户端和网桥两部分组成,其中协议拟态客户端包括环境感知、拟态决策、拟态实施处理、发送和接收处理5个部分;网桥分为环境感知、数据接收、恢复和发送4个部分.全面研究和评估已有的几个具有拟态特征的协议,包括SkypeMorgh、StegoTorus、CensorSpoofer及Format-TransformingEncryption系统,从认证机制、拟态变换和加密技术及流量控制技术等方面进行对比和分析,提出协议拟态的基本科学问题供进一步研究. In the field of cyberspace security, a protocol can be disguised as another protocol to a- void being detected. Draw on the theory of biological mimicry, the technical framework of net- work protocol mimicry system is proposed. The framework includes client and bridge. The client contains environment perception, mimicry decision, mimicry implementation process, sending and reception.The bridge contains environment perception, receiving, sending and recovery mod- ules.Then some existing protocol mimicry systems including SkypeMorgh, StegoTorus, Censor- Spoofer and Format-Transforming Encryption are comprehensively analyzed and evaluated from the perspective of authentication, imitation, encryption and flow control etc. Finally, the pro- posed basic scientific problems of protocol mimicry could be used for further research study.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2016年第5期1-8,共8页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金资助项目(61402035)
关键词 协议拟态 匿名通信 加密认证 流量控制 protocol mimicry anonymous communication encryption authenticated traffic con- trol
  • 相关文献

参考文献23

  • 1Defeat internet censorship: Overview of advanced technologies and products[J].White Paper,Global Internet Freedom Consortium,2007,12:1-22. 被引量:1
  • 2WUSTROW E,WOLCHOK S,GOLDBERG I,et al.Telex:anticensorship in the network infrastructure[C].In Proceedings of the 20th USENIX Security Symposium,2011:30-45. 被引量:1
  • 3MOGHADDAM H.SkypeMorph: Protocol obfuscation for tor bridges[C],In CCS,2012:92-108. 被引量:1
  • 4WEINBERG Z,WANG J,YEGNESWARAN V,et al.StegoTorus : A camou- flage proxy for the tor anonymity system[C].ACM Conference on Computer and Communications Security,2012:109-120. 被引量:1
  • 5WANG Q,GONG X,NGUYEN G,et al.CensorSpoof- er: asymmetric communication using IP spoofing for censorship-resistant web browsing[C].ACM Conference on Computer and Communications Security,2012:121-132. 被引量:1
  • 6KEVIN D P,SCOTTE C,THOMAS R,et al.Protocol misidentication made easy with format-transforming encryption [C].ACM Conference on Computer and Communications Security,2013:61-72. 被引量:1
  • 7The bridge of obfsproxy [EB/OL].[2016-03-01].https ://blog,torproject.org/blog/obfsproxy-next-step-censor-ship-arms-race. 被引量:1
  • 8SMITS R,JAIN D,PIDCOCK S,et al.BridgeSPAimproving tor bridges with single packet authoriztion[J].ACM workshop on Privacy in the Electronic Society,2011:93-102. 被引量:1
  • 9DYER K P,COULL S E,SHRIMPTON T.Marionette: a programmable network traffic obfuscation sys-tem[C].Usenix Conference on Security Symposium,2015:367-382. 被引量:1
  • 10Skype ban in the UAE could be lifted,as it is purely a licensing matter [EB/OL].[2016-03-01].http:// thenextweb.com/me/2012/04/21/skype-ban-in-the-uae-could-be-lifted-as-it-is-purely-a-licensing-matter/. 被引量:1

同被引文献35

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部