网络与信息安全学报 ›› 2023, Vol. 9 ›› Issue (1): 115-129.doi: 10.11959/j.issn.2096-109x.2023006

• 学术论文 • 上一篇    下一篇

基于时隙的多重冗余流指纹模型

刘科显1, 关建峰1, 张婉澂1, 何志凯2, 闫迪嘉3   

  1. 1 北京邮电大学计算机学院(国家示范性软件学院),北京 100876
    2 中国航空综合技术研究所,北京 100028
    3 北京工业大学信息学部,北京 100124
  • 修回日期:2022-11-02 出版日期:2023-02-25 发布日期:2023-02-01
  • 作者简介:刘科显(1996- ),男,河南周口人,北京邮电大学博士生,主要研究方向为网络安全
    关建峰(1982- ),男,河南巩义人,北京邮电大学副教授、博士生导师,主要研究方向为网络架构、区块链与网络安全、移动互联网、大数据与人工智能
    张婉澂(1995- ),女,安徽芜湖人,北京邮电大学硕士生,主要研究方向为内生网络安全
    何志凯(1986- ),男,安徽蚌埠人,中国航空综合技术研究所高级工程师,主要研究方向为无人系统标准化与可用性
    闫迪嘉(2000- ),男,北京人,主要研究方向为网络安全
  • 基金资助:
    国家重点研发计划(2018YFE0206800)

Multiple redundant flow fingerprint model based on time slots

Kexian LIU1, Jianfeng GUAN1, Wancheng ZHANG1, Zhikai HE2, Dijia YAN3   

  1. 1 School of Computer Science (National Pilot Software Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China
    2 AVIC China Aero-poly Technology Establishment, Beijing 100028, China
    3 Faculty of Information Technology Beijing University of Technology, Beijing 100124, China
  • Revised:2022-11-02 Online:2023-02-25 Published:2023-02-01
  • Supported by:
    The National Key R&D Program of China(2018YFE0206800)

摘要:

随着互联网的日益广泛应用,各种网络安全问题频频暴露,以“打补丁”形式为主的安全增强模式难以有效防范日益增长的安全风险,网络安全领域研究者认为未来互联网体系架构应当将安全作为一种基本属性,实现网络架构对安全的内生支持。为了支持内生安全的数据可信,在流水印/流指纹机制的研究基础之上,设计实现了一种基于时隙的多重冗余流指纹模型。该模型使用3个时隙间隔,通过对指定时隙内的数据包进行延迟等操作,可在相邻比特操作不产生冲突的情况下实现指纹嵌入,并且引入冗余编码来提高指纹健壮性,同时考虑到网络中抖动或攻击者的恶意扰乱等行为,将延迟干扰、垃圾数据包干扰以及丢包干扰对模型的影响进行了理论分析,结果表明在给定网络流中数据的包分布时,随着冗余位的增加,指纹模型的鲁棒性明显提高。为了减少时间和空间消耗,提高数据包操作的效率和精度,基于内核设计和实现流指纹原型系统,并对其效率和鲁棒性进行评估,实验表明该模型具有很高的鲁棒性。最后,展示了所提模型的应用场景,基于该流指纹功能模型,能有效检测中间人攻击,预防网络身份欺骗。

关键词: 流水印, 流指纹, 内生安全, 多重冗余

Abstract:

With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.

Key words: flow watermark, flow fingerprint, endogenous safety and security, multiple redundancy

中图分类号: 

No Suggested Reading articles found!