计算机应用 ›› 2012, Vol. 32 ›› Issue (01): 78-81.DOI: 10.3724/SP.J.1087.2012.00078

• 第四届中国计算机网络与信息安全学术会议论文(CCNIS’2011) • 上一篇    下一篇

利用共享文件实现的网络隐蔽通道模型

王标1,张世韬2,方颖珏3   

  1. 1. 国际关系学院 信息科技系,北京 100091
    2. 清华大学 软件学院,北京100084
    3. 深圳大学 数学与计算科学学院,广东 深圳 518060
  • 收稿日期:2011-07-29 修回日期:2011-09-07 发布日期:2012-02-06 出版日期:2012-01-01
  • 通讯作者: 方颖珏
  • 作者简介:王标(1979-),男,浙江缙云人,副教授,博士,主要研究方向:信息安全、网络舆情监控;张世韬(1989-),男,北京人,硕士研究生,主要研究方向:文本数据挖掘;方颖珏(1978-),女,江苏扬州人,讲师,博士,主要研究方向:代数学、信息安全。

Implementation of network covert channel model based on shared file

WANG Biao1,ZHANG Shi-tao2,FANG Ying-jue3   

  1. 1. Department of Information Science and Technology, University of International Relations, Beijing 100091, China
    2. School of Software, Tsinghua University, Beijing 100084, China
    3. College of Mathematics and Computational Science, Shenzhen University, Shenzhen Guangdong 518060, China
  • Received:2011-07-29 Revised:2011-09-07 Online:2012-02-06 Published:2012-01-01
  • Contact: FANG Ying-jue

摘要: 网络隐蔽通道技术是一种利用网络通过绕过强制访问控制措施而建立起的违背BLP模型的信息泄露秘密信道,这给高密级信息的机密性造成了威胁。首先探讨了隐蔽通道与非自主访问控制模型的关系;然后在设想的情景模式和传输模式下,设计了不同共享文件数目情况下的网络隐蔽通道通信协议,形成了网络隐蔽通道模型;通过实验对利用这些协议形成的隐蔽通道模型的传输性能进行了比较研究,分别探讨了它们对系统机密性造成的威胁程度;最后,总结不同协议机制下隐蔽通道模型的传输特点和可能对系统造成的威胁,对防范此类隐蔽通道具有一定意义。

关键词: 网络隐蔽通道模型, BLP模型, 机密性, 共享文件, 协议性能

Abstract: Network covert channel technique is a secret information leaking channel which violates the Bell-La Padula (BLP) model by avoiding the detection of mandatory access control measures, which threatens the confidentiality of high level information. The authors first discussed the relations between covert channel and non-discretionary access control model, and then formed the covert channel model by designing different protocols of covert channel model according to different number of shared files under the assumed scenario and transmitting pattern. The performances of this kind of network covert channel model led by these protocols were compared by experiments, and the extent of threat to the confidentiality they might make was discussed separately. Finally, the authors summarized the transferring characteristics of the model generated by these protocols and the menace they might bring, which made sense to the prevention of the network covert channels.

Key words: network covert channel model, Bell-La Padula (BLP) model, confidentiality, shared file, protocol performance

中图分类号: