Covert communication detection method based on have message encoding in the process of bittorrent file sharing

A technology of message encoding and covert communication, applied in electrical components, transmission systems, etc., can solve the problems of the Have message covert communication detection method proposed in no open literature, achieve reliable detection results, and overcome the effect of high false alarm rate.

Active Publication Date: 2019-07-16
JIANGSU UNIV OF SCI & TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, there is no public literature proposing a detection method for covert communication of Have messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication detection method based on have message encoding in the process of bittorrent file sharing
  • Covert communication detection method based on have message encoding in the process of bittorrent file sharing
  • Covert communication detection method based on have message encoding in the process of bittorrent file sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a schematic diagram of the detection process based on the Bayesian classifier. In this embodiment, for the covert communication detection method based on Have message encoding in the BitTorrent file sharing process, first capture the normal data and the data to be tested, and extract the normal data and the data to be tested respectively. The three characteristics of information entropy, ε similarity and variance, using normal data as training data, and testing data as testing data, input Bayesian classifier (wherein the normal data and testing data are processed in no particular order); the specific process as follows:

[0038] Step 1: Set up the data capturer, use the data capturer to capture normal data, and filter out the Have messages.

[0039] Step 2: Set up the data processor, use the data processor to extract the load in each normal data Have message (the load in the message is a positive integer, and it shows a rising trend), and calculate the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a covert communication detection method based on Have message encoding in the BitTorrent file sharing process. Firstly, the normal data and the data to be tested are captured, and the three characteristics of information entropy, ε similarity and variance of the normal number and the data to be tested are respectively extracted. , the normal data is used as the training data, the data to be tested is input into the Bayesian classifier as the test data, and the Bayesian classifier judges whether the data to be tested is similar to the normal data, if similar, it is judged as normal, otherwise it is judged as abnormal. The invention adopts multi-feature detection of data flow, can effectively overcome the problem of high false alarm rate caused by a single feature, and can provide reliable detection results.

Description

technical field [0001] The invention relates to network and information security technology, in particular to a covert communication detection method based on Have message encoding in the BitTorrent file sharing process. Background technique [0002] As a covert communication method, network steganography uses legal data flow as a carrier to transmit secret information in the network. Governments, enterprises and individuals securely transmit important information by utilizing network covert channels for covert communication. But at the same time, network steganography will also be used by illegal organizations and individuals to transmit harmful information and threaten public safety. Therefore, detecting the existence of network steganography and preventing harm is a crucial link. Steganographic detection technology, as a very important technology in the field of network security protection, has attracted extensive attention of researchers, and has achieved a lot of rese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/30H04L67/06H04L67/104H04L67/1095
Inventor 翟江涛李萌刘伟伟徐留杰
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products