Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-way reliable covert channel based on TCP effective loads

A payload and hidden information technology, applied in the field of information security, can solve redundancy and other problems, achieve the effects of ensuring consistency, reducing embedding rate, and improving detection resistance

Inactive Publication Date: 2014-06-04
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

3. The various message structures of the TCP / IP protocol usually have a fixed format. While this fixed format brings convenience to Internet interconnection, it also inevitably introduces redundancy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way reliable covert channel based on TCP effective loads
  • Two-way reliable covert channel based on TCP effective loads
  • Two-way reliable covert channel based on TCP effective loads

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] attached image 3 It is a flow chart of the communication interaction between the sender and the receiver in the actual design. Specifically, it is implemented based on socket programming, and since the covert channel is designed based on TCP, a stream socket (SOCK_STREAM) is used to realize the software program of the sender and the receiver. The sender and the receiver adopt the active request method. First, the receiver creates a stream socket and binds the socket to a local address and port, and then sets the local socket to the listening mode. Accept the sender's connection request. The sender sends a connection request to the receiver after creating a local socket. The receiver receives the connection request and returns a new socket corresponding to this connection. The receiver and the sender communicate through this new socket. After the communication is over, the two parties disconnect according to the TCP four-wave process and close the socket.

[0044] a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret information coding and sending method based on TCP effective loads and a corresponding secret information receiving and decoding method. On a sender, an encoder encodes secret information according to a coding schedule consulted in advance; then, the secret information is sent to a receiver. On the receiver, after the receiver monitors and captures a data packet of a fixed port, a decoder carries out TCP effective load extraction on the data packet monitored and captured at the fixed port, and the secret information is obtained through decoding according to the coding schedule. The methods are designed based on a TCP, and the quality and safety of covert channel communication are guaranteed through the reliability of the TCP. High practicality is achieved, the methods can be applied to the actual communication process well, the proportion of coding to non-coding of effective length can be adjusted in a balanced mode, and the controllability of the detection resisting performance of a covert channel is achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for constructing a reliable bidirectional covert channel based on a TCP payload. Background technique [0002] Information hiding technology is to use the redundancy of carrier information to embed concealed information into ordinary information, and send out secret information through the transmission of ordinary information. As a new information security technology, information hiding has developed rapidly in recent years and is widely used in the fields of digital information copyright protection, authentication, covert transmission of confidential information and so on. [0003] Traditional information hiding mostly uses text, audio, and images as carriers. In recent years, information hiding based on network protocols has gradually become a hot topic. Compared with the traditional carrier, the information hiding technology with the protocol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L1/18
Inventor 黄刘生沈瑶陆潇榕杨威缪海波
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products