计算机应用 ›› 2018, Vol. 38 ›› Issue (8): 2267-2273.DOI: 10.11772/j.issn.1001-9081.2018020558

• 网络空间安全 • 上一篇    下一篇

基于信息隐藏技术的木马植入方法

张茹, 黄福鸿, 刘建毅, 祝锋   

  1. 北京邮电大学 网络空间安全学院, 北京 100876
  • 收稿日期:2018-01-29 修回日期:2018-03-28 出版日期:2018-08-10 发布日期:2018-08-11
  • 通讯作者: 祝锋
  • 作者简介:张茹(1976-),女,山东济南人,副教授,博士,主要研究方向:密码学、信息隐藏、数字水印、版权保护;黄福鸿(1993-),男,湖南衡阳人,硕士研究生,主要研究方向:信息隐藏、数字水印;刘建毅(1980-),男,山西忻州人,副教授,博士,主要研究方向:数字内容安全、智能信息处理、数据挖掘;祝锋(1995-),男,河南信阳人,硕士研究生,主要研究方向:信息隐藏、数字水印。
  • 基金资助:
    国家自然科学基金资助项目(U1636212,U1636112)。

Trojan implantation method based on information hiding

ZHANG Ru, HUANG Fuhong, LIU Jianyi, ZHU Feng   

  1. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2018-01-29 Revised:2018-03-28 Online:2018-08-10 Published:2018-08-11
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (U1636212, U1636112).

摘要: 针对互联网木马存在易被溯源追踪的问题,提出一种基于多媒体文件的新型木马方案,利用信息隐藏算法将木马程序作为秘密数据嵌入到载体图像中。渗透成功后,对盗取的数据在本地进行加密之后同样隐写到载体图像并上传至社交网络,攻击端通过开放的社交网络下载并提取秘密数据。实验显示,所设计的JPEG图像信息隐藏算法性能良好,基于该隐藏算法的木马渗透方案在隐蔽性、抗取证、防追踪以及穿透审计等特点上优于已有的图片木马。社交网络中此类木马可造成用户隐私泄露,所以最后给出了一些防范措施。

关键词: 木马, 社交网络, JPEG, 信息隐藏

Abstract: Since a large number of Trojans are easily tracable on the Internet, a new Trojan attack scheme based on multimedia document was proposed. Firstly, the Trojan program was embedded into a carrier image as secret data by steganography. After the Trojan program was successfully injected, the encrypted user information was also hidden into the carrier image by steganography. Then the host automatically uploaded pictures to a social network. Finally, the attacker downloaded images from the social network and extracted secret data from images. The theoretical analysis and simulation results show that the proposed JPEG image steganography algorithm has good performance, and the Trojan scheme based on it outperfoms some existing algorithms in concealment, anti-forensics, anti-tracking and penetrating auditing. Such Trojans in social networks can cause user privacy leaks, so some precautions are given at last.

Key words: Trojan, social network, JPEG, information hiding

中图分类号: