通信学报 ›› 2022, Vol. 43 ›› Issue (4): 186-201.doi: 10.11959/j.issn.1000-436x.2022072

• 综述 • 上一篇    下一篇

泛在网络环境下隐蔽通道关键技术研究综述

李凤华1,2, 李超洋1,2, 郭超3, 李子孚1, 房梁1, 郭云川1,2   

  1. 1 中国科学院信息工程研究所,北京 100093
    2 中国科学院大学网络空间安全学院,北京 100049
    3 北京电子科技学院电子与通信工程系,北京 100070
  • 修回日期:2022-03-09 出版日期:2022-04-25 发布日期:2022-04-01
  • 作者简介:李凤华(1966- ),男,湖北浠水人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为网络与系统安全、大数据安全与隐私保护、密码工程
    李超洋(1996- ),男,河北唐山人,中国科学院信息工程研究所硕士生,主要研究方向为网络与系统安全
    郭超(1987- ),女,江西九江人,博士,北京电子科技学院讲师,主要研究方向为空间信息网络、通信安全、传输控制
    李子孚(1992- ),女,内蒙古赤峰人,博士,中国科学院信息工程研究所工程师,主要研究方向为网络与系统安全、访问控制
    房梁(1989- ),男,山西太原人,博士,中国科学院信息工程研究所副研究员,主要研究方向为信息安全、访问控制
    郭云川(1977- ),男,四川营山人,博士,中国科学院信息工程研究所正高级工程师、博士生导师,主要研究方向为访问控制、网络安全
  • 基金资助:
    国家重点研发计划基金资助项目(2019YFB2101702);国家自然科学基金资助项目(U1836203);广东省重点领域研发计划基金资助项目(2019BP010137005);中国科学院青年创新促进会人才基金资助项目(2019160)

Survey on key technologies of covert channel in ubiquitous network environment

Fenghua LI1,2, Chaoyang LI1,2, Chao GUO3, Zifu LI1, Liang FANG1, Yunchuan GUO1,2   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3 Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing 100070, China
  • Revised:2022-03-09 Online:2022-04-25 Published:2022-04-01
  • Supported by:
    The National Key Research and Development Program of China(2019YFB2101702);The National Natural Science Foundation of China(U1836203);The Key-Area Research and Development Program of Guangdong Province(2019BP010137005);Talent Fund Program of the Youth Innovation Promotion Association CAS(2019160)

摘要:

在泛在网络环境下,隐蔽通道通过修改系统共享资源,绕开系统的安全策略传输隐蔽信息,给计算机和网络系统造成了严重的安全威胁。针对此问题,主要从度量、构建和检测3个方面对泛在网络环境下的隐蔽通道相关研究进行归纳和分析。首先,总结归纳了典型的隐蔽通道度量指标,包括隐蔽通道的容量、稳健性、抗检测性、规律性和形状。其次,归纳整理了隐蔽通道的构建方法,并从共享资源、容量、稳健性、抗检测性、优点和缺点6个方面对隐蔽通道构建技术进行了对比分析。再次,从隐蔽通道类型、准确率、是否能盲检、优点和缺点5个方面对比分析了隐蔽通道的检测技术。最后,总结了隐蔽通道的发展趋势并展望了未来研究方向。

关键词: 泛在网络, 隐蔽通道度量, 隐蔽通道构建, 隐蔽通道检测

Abstract:

In the ubiquitous network environment, covert channel bypasses the system’s security strategy to transmit covert information by modifying the system’s shared resources, which poses a serious security threat to the computer and network system.The researches on covert channel in ubiquitous network environment were summarized and analyzed from three aspects of measurement, construction and detection.First, the typical covert channel metrics including the capacity, robustness, anti-detection, regularity and shape were summarized.Second, the construction technologies of covert channel were summarized and analyzed from six aspects of resource sharing, capacity, robustness, anti-detection, advantages and disadvantages in the first time.Third, the detection technologies of covert channel were compared and analyzed from five aspects of the type of covert channel, accuracy, whether it can be blind detection, the advantages and disadvantages.Finally, the development trends of covert channel were summarized and future research directions were prospected.

Key words: ubiquitous network, covert channel measurement, covert channel construction, covert channel detection

中图分类号: 

No Suggested Reading articles found!