期刊文献+

基于中间人的RDP数据采集 被引量:5

RDP Data Gathering Method Based on Man-in-Middle
下载PDF
导出
摘要 RDP是Windows操作系统中的远程桌面协议,属于一种加密协议,由于Windows操作系统被广泛应用于个人和运维环境中,如何对RDP操作进行合法合规的安全审计,提高运维系统的安全性。RDP采用加密数据传输,为解决RDP加密数据采集并解析成明文数据进行安全审计的问题,本文提出了一种基于中间人原理的RDP数据采集方法,该方法只针对RDP的基本连接。该方法基于客户端和服务器的TCP连接,在密钥协商阶段,获取加密数据传输阶段的RC4密钥。在加密数据传输阶段,收到密文数据后直接转发,再用获取的RC4密钥进行解密,获取明文数据。通过在实际的数据采集器中的实现,该方法相比已有的串联方法减少了28%的传输延迟时间,相比已有的旁路方法,不受网络丢包影响,且更安全,适用范围广。 RDP is a remote desktop protocol in the Windows operating system and is widely used in personal and operation and maintenance environments. How to support the RDP audit to improve the security of operation and maintenance systems is an important question. RDP is a kind of cryptographic protocol. To solve the problem of RDP encryption data gathering,decryption and audit,a RDP gathering method based on man-in-middle is proposed. The proposed method just applies to RDP standard connection. The proposed method is based on the TCP connection between client and server. The method gets the RC4 secret key which is used in the phase of the encryption data transmission during the phase of the key agreement. During the phase of the encryption data transmission,the encryption data is transmitted immediately when the data is obtained. After that,the encryption data is decrypted by using the RC4 secret key. The proposed method is realized in a real network data collector. The proposed method can decrease the transmission delay by 28% in comparison to the series method. The proposed method can increase the security and is not affected by the network packet loss in comparison to the bypass method.
出处 《网络新媒体技术》 2018年第1期16-21,共6页 Network New Media Technology
基金 中国科学院战略性先导科技专项课题:未来网络架构研究与边缘设备研制(XDA06010302)
关键词 RDP 数据采集 解密 审计 中间人 RDP, data gathering, decryption, data audit, man - in - middle
  • 相关文献

参考文献8

  • 1陈泉清..基于协议解析的网络安全审计系统的设计与实现[D].电子科技大学,2013:
  • 2陈雁翔..基于中间件技术的应用安全审计平台设计与实现[D].浙江工业大学,2015:
  • 3廖斌..网络安全审计系统的设计与实现[D].中国科学院大学,2015:
  • 4吴京洪,倪宏,曾学文,叶晓舟.面向网络数据审计的SSH请求复原方法[J].网络新媒体技术,2016,5(6):12-16. 被引量:6
  • 5吴耀芳..基于应用代理的运维堡垒机研究与设计[D].上海交通大学,2014:
  • 6崔文超..信息安全运维审计模型及关键技术研究[D].华北电力大学(北京),2014:
  • 7王悦..RDP协议的安全性分析与中间人攻击[D].北京邮电大学,2008:
  • 8陈丹伟,薛青晗,章韵.基于ECC的RDP认证机制研究[J].南京邮电大学学报(自然科学版),2012,32(5):32-37. 被引量:3

二级参考文献15

  • 1罗鹏 祝跃飞.Windows下RDP协议的安全性.计算机工程,2007,(20):145-147. 被引量:4
  • 2SANJEEV K P,ARUNA K ,DHAEMENDER S K. CTES based se-cure approach for authentication and authorization of resource and service in clouds [ C] / International Conference on Computer & Communication Technology. 2011 :444 -449. 被引量:1
  • 3CHEN T H,YEH H,LSHIH W K. An advanced ECC dynamic id -based remote mutual authentication scheme for cloud computing[C] Fifth FTRA International Conference on Multimedia and U-biquitous Engineering. 2011 : 155 - 159. 被引量:1
  • 4NILS G,ARUN P, ARVINDERPAL W, et al. Comparing ellipticcurve cryptography and RSA on 8-bit cpus [ J]. Lecture Notes inComputer Science,2004,3156 :925 -943. 被引量:1
  • 5NIRAJ T,DAVID G,ANDERSEN M. Quantifing interactive user ex- perience on thin client[ C] //IEEE Computer. 2006 :46 -52. 被引量:1
  • 6SK H I,BISWAS G P. Improved remote login scheme based on ECC [C] //IEEE International Conference on Recent Trends in Informa- tion Technology. 2011 :1221 - 1226. 被引量:1
  • 7ZHAO Guanglei, SI Xianping, WANG Jingcheng, et al. A novelmutual authentication scheme for Internet of things [C] // Proceed-ings of International Conference on Modelling,Identification andControl. Shanghai,China,2011:26 -29. 被引量:1
  • 8MONCEF A,AMAR S. Elliptic curve crytography and its applica-tions [C] // International Workshop on Systems Signal Processingand Their Applications. 2011 : 1540 - 1543. 被引量:1
  • 9FREDERIC F A C, BENOIT L,EMILIE C, et al. Anadaptive ap-proach to optimize thin client protocols [C] // Future Network &MobileSummit Conference Proceedings Paul Cunningham and Mir-iam Cunningham. 2010: 1 -9. 被引量:1
  • 10沈士根,叶利华,乐光学.基于RDP协议的远程接入平台设计与实现[J].微电子学与计算机,2008,25(3):55-57. 被引量:5

共引文献7

同被引文献29

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部