Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Covert communication method based on IPID (Internet Protocol Identification) bit delta modulation

A communication method and delta modulation technology, applied in digital transmission systems, error prevention, electrical components, etc., can solve problems such as poor robustness in network emergencies, and achieve the effects of improving concealment, ensuring types, and improving security.

Active Publication Date: 2011-08-03
NANJING UNIV OF SCI & TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Cabuk et al. (5.IP Covert Timing Channels: Design and Detection.Proc.11th ACM Conf.Computer and Communications Security (CCS), Oct.25-292004.) proposed a simple covert communication construction using time interval coding Algorithm, the algorithm implementation is relatively simple but the robustness to network emergencies is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication method based on IPID (Internet Protocol Identification) bit delta modulation
  • Covert communication method based on IPID (Internet Protocol Identification) bit delta modulation
  • Covert communication method based on IPID (Internet Protocol Identification) bit delta modulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] The present invention is independent of platform, is applicable to operating systems such as windows, Linux, and the carrier of covert communication is the ID bit of IP packet, so the present invention is applicable to all communication protocols based on IP agreement, below with the present invention in windows The implementation below is taken as an example for illustration. NDIS is a network driver interface specification under the windows system jointly developed by Microsoft and 3COM. The purpose of NDIS is to develop a standard API interface for the network card. Using these APIs, you can develop related windows-based system programs. This type of program can realize functions such as windows-based network data interception, modification, and release.

[0037] The invention utilizes NDIS technology to develop a program based on windows. This program can block the normal data flow, according to the sending step 3, embed the connection information into the IPID bit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a covert communication method based on IPID (Internet Protocol Identification) bit delta modulation. By using the method, sensitive information to be transmitted can be concealed in a head part of a network data packet in a computer network environment, so that the sensitive information can not be easily perceived. The method comprises the following steps: when a transmitting party transmits a network data packet, embedding covert information into low-order 4 bits of the IPID according to the corresponding modulation method, wherein high-order 8 bits of the IPID are used for implementing the incremental mode so as to enhance the covertness, and high-order 4 bits of low-order 8 bits are used for implementing synchronization and verification of data communication; and after a receiving party receives the data packet, extracting data of the low-order 8 bits, wherein the high-order 4 bits are used for verification, and the low-order 4 bits are used for the covertness of the data. The method utilizes the self incremental mode during normal communication of the IPID bits, has the advantages of favorable covertness and attack resistance, and is suitable for transmitting sensitive information with a small data size.

Description

technical field [0001] The invention belongs to the technical field of communication and information security, in particular to a secret communication method based on incremental modulation of IPID bit (IP identification, IP stands for Internet Protocol). Background technique [0002] Network covert communication is an interdisciplinary discipline that integrates data communication, computer network, information hiding, information security and other technologies that have emerged in recent years. It refers to using computer network communication data as a carrier to hide secret data in it. The technique of covert communication. Network covert communication can be used to penetrate network security facilities such as access control, firewall and intrusion detection, and implement covert communication that cannot be detected by others. Its outstanding features are high concealment and difficulty in tracking and obtaining evidence. [0003] Network covert communication can be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/00
Inventor 刘光杰翟江涛戴跃伟李宏圆
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products