Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

84 results about "Covert channel" patented technology

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term, originated in 1973 by Lampson, is defined as channels "not intended for information transfer at all, such as the service program's effect on system load," to distinguish it from legitimate channels that are subjected to access controls by COMPUSEC.

Method for detecting TCP/IP protocol concealed channel based on fuzzy neural network

The invention discloses a method for detecting TCP / IP protocol covert channel based on fuzzy neural network. The method adopting the fuzzy neural network introduces a novel method for detecting the network covert channel by analyzing a domain in a TCP / IP data package head structure of a network interface. The method firstly obtains the TCP / IP data package from the network interface, analyzes the option domain in the data package head structure to obtain a network connection feature vector, sends the feature vector into the fuzzy neural network, trains the fuzzy neural network by a self-adapting fuzzy neural inference system to form a model of the fuzzy neural network, subsequently, sends the feature vector into the model of trained fuzzy neural network to get an output value, and finally performs fuzzy clustering onto the output value so as to distinguish whether the output data has covert channel. The invention is applicable for a mainstream operating system, has wide application range, can increase the security of the operating system and effectively prevents secret information leakage.
Owner:ZHEJIANG UNIV

Information flow analysis method based on system source code searching concealed channel

The invention provides an information flow analytic method based on the searched convert channels of system source codes, which comprises the following steps: functions in the source codes and the statements and the variables in the functions are identified by dint of lexical analyzers and scanning system source codes; the call relations of the functions are determined, statement tree fields are constructed and functional dependence gathers of each function are given according to the functions and the function call statements identified by scanners; function information flow trees are constructed and are lopped with the statements and the variables which can generate information flow and are identified by the scanners as the input for information flow analysis; the function information flow trees are traversed, and the information flow graphs of each function are output; the shared variable visibility between dependence concentration functions and the modifiability information are acquired in functional dependence gathers according to the functional dependence gathers and the information flow graphs, thus generating shared resource matrices; covert channels are searched with the shared resource matrices as the input, and the covert channel sequences in the system are output. By adopting the information flow analytic method, the search work precision of the covert channels is improved.
Owner:JIANGSU UNIV

Network covert channel detecting method

InactiveCN102594619AReliable detectionOvercome the disadvantages of only targeting specific covert channelsData switching networksData streamCovert communication
An FTP (File Transfer Protocol) command-sequence-coding network covert channel (FTP-NCC) is a covert communication mode that a transmitting end embeds covert information into a normal FTP application by a certain coding mode. The invention discloses a network covert channel detecting method for the FTP command sequence coding on the basis of a Markov model. The network covert channel detecting method comprises two steps of training and detection, wherein the training step is used for acquiring the Markov model of a normal FTP communication command data stream; the detection step is used for performing FTP-NCC detection by using a maximum posterior probability method according to the model obtained by the training step. The method can realize reliable detection for the FTP-NCC.
Owner:CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH

Method using multi-dimensional feature vectors to detect IP ID covert channel

The invention discloses a method using multi-dimensional feature vectors to detect an IP ID covert channel. The method comprises the following steps of the feature extracting step 1 of respectively and continuously capturing N IP data packets for normal and abnormal training samples, extracting information of an ID domain of the head of an IP, acquiring the ID difference value of delta id1, delta id2,..., delta idn-1 between adjacent data packets, and carrying out statistics on a mean value E, a standard deviation D and an entropy of the id1, delta id2,..., delta idn-1 to obtain three-dimensional feature vectors, the step 2 of carrying out training on an SVM classifier, repeating the step 1 to obtain a three-dimensional feature vector set of the normal training samples and a three-dimensional feature vector set of the abnormal training samples, and carrying out training on the SVM classifier to obtain a classifying detecting model, and the step 3 of classifying the feature vectors of a channel to be detected through the SVM classifier according to the trained and obtained classifying model. The method is high in detecting efficiency, uses multi-dimensional statistic features as classifying data and improves the detection accuracy.
Owner:SUZHOU INST FOR ADVANCED STUDY USTC

Detection method and detection equipment of hidden channel

The embodiment of the application provides a detection method and detection equipment of a hidden channel. The detection method comprises the following steps: grouping HTTP (Hyper Text Transport Protocol) request flow according to source IP (Internet Protocol) addresses and target IP addresses of messages in the HTTP request flow to obtain at least one group of messages, and executing subsequent steps for a first group of messages: generating a record table corresponding to the first group of messages according to timestamps and HTTP head tags carried by the messages; performing statistics to obtain a feature value of the first group of messages according to the record table corresponding to the first group of messages; and if the feature value of the first group of messages does not belongs to a normal threshold range of the feature value, determining that a Cookie hidden channel exists in the first group of messages, wherein the normal threshold range of the feature value is trained by HTTP request flow in a history time interval. In the embodiment of the application, whether the hidden channel exists in the HTTP request flow within predetermined time or not is judged through normal ranges of feature values of normal messages, so that the detection effectiveness of the HTTP hidden channel is improved.
Owner:HUAWEI TECH CO LTD

Virtual machine simultaneous-locating detection method based on hidden channel under cloud environment

The invention discloses a virtual machine simultaneous-locating detection method based on a hidden channel under a cloud environment. The method includes the steps that (1) a plurality of virtual machine embodiments of the same type are deployed on a cloud platform; (2) the real hidden channel, based on the cloud platform, of virtual machine monitor share resources is selected; (3) two virtual machine embodiments are selected from the virtual machine embodiments and recorded as the virtual machine embodiment A and the virtual machine embodiment B respectively; (4) the virtual machine embodiment A and the virtual machine embodiment B serve as a sender and a receiver of the hidden channel respectively, the hidden channel is used for communication, if the communication succeeds, the virtual machine embodiment A and the virtual machine embodiment B are simultaneously located on a physical machine, and if not, the virtual machine embodiment A and the virtual machine embodiment B are not simultaneously located on the physical machine. By means of the virtual machine simultaneous-locating detection method based on the hidden channel under the cloud environment, efficiency and reliability of the simultaneous-locating detection are improved, excessive dependence on the network is avoided through the hidden channel, and the problem of simultaneous-locating detection is solved on the premise that the performance is not lowered.
Owner:PEKING UNIV

Systems analysis and dividing method orienting covert channel analysis

InactiveCN101364203ASolving large scaleSolve complexitySoftware testing/debuggingSystems analysisCircular analysis
A systematic method for analyzing and dividing a covert channel comprises the following steps: Step 10: initializing operation; Step 11: determining whether function call graph is null, turning to Step 12 and indicating that the analytical partitioning algorithm is ended if the function call graph is null, otherwise turning to Step 13; Step 12: outputting the analytical results; Step 13: determining whether the function call graph is connected; Step 14: finding out all disconnected branches of the function call graph; Step 15: circularly analyzing each connected branch of the function call graph; Step 16: determining whether nodes which are independent of other nodes exist in the function call graph; Step 18: deleting the nodes the outdegree of which is zero from the function call graph and adding the nodes at the end of a result linked list; Step 19: determining whether a maximum strongly connected subgraph exists in the function call graph, if so, turning to Step 1a, otherwise turning to Step 11; Step 1a: finding the maximum strongly connected subgraph from the function call graph; Step 1b: deleting the maximum strongly connected subgraph; Step 1c: ending operation.
Owner:NANJING UNIV

Cryptographic method protected against covert channel type attacks

InactiveUS7742595B2Facilitate the breaking down of each blockSecret communicationPlatform integrity maintainanceComputer hardwareCovert channel
The invention relates to a cryptographic method secured against a covert channel attack. According to the invention, in order to carry out a selected block of instructions as a function of an input variable amongst N predefined instruction blocks, a common block is carried out on the predefined N instruction blocks, a predefined number of times, the predefined number being associated with the selected instruction block.
Owner:GEMPLU

Method for building covert channel with network flow watermarking of forward error correction code and interleaved code

ActiveCN108650054ATroubleshoot transmission correctness issuesVerify reliabilityForward error control useComputer hardwareInformation transmission
The invention discloses a method for building a covert channel with network flow watermarking of a forward error correction code and an interleaved code, and relates to a covert channel for information secure transmission in the field of communication. The method comprises the following steps: firstly, encoding original secret information to be transmitted by an error correction code encoder, andprocessing an obtained codeword signal according to a network flow watermarking method; in a decoding stage, making a secret information receiver acquire a watermark signal from target network stream,and transmit the watermark signal to an interleaved code decoder for processing to obtain a de-transposed watermark signal; if the watermark signal is subjected to PN code spread spectrum processing,processing the watermark signal with a PN decoder; and finally, transmitting the de-transposed watermark signal or the PN decoded watermark signal to an error correction code decoder for processing to recover the original secret information. Through adoption of the method for building the covert channel with network flow watermarking of the forward error correction code and the interleaved code,the automatic error correction capability specific to the secret information is realized, and the reliability of information transmission is enhanced.
Owner:XIAMEN UNIV

Detection method of time-sequence type covert channel based on neural network

The invention discloses a detection method of a time-sequence type covert channel based on a neural network. The method comprises the steps of obtaining three feature values of a time interval sequence including a variable coefficient, similarity and an entropy value according to a time interval between data packages; taking a four-dimensional feature vector consisting of the variable coefficient, the similarity, the entropy value and a channel type is a training sample of the neural network to train; detecting by the neural network to judge whether the communication channel has the convert channel and the belonged type after the neural network is astringed.
Owner:SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products