《计算机应用研究》|Application Research of Computers

一种针对BitTorrent协议中have消息的隐写分析方法

Steganalysis method for have message in BitTorrent protocolXu Xinyi, Zhai Jiangtao, Dai Yuewei(School of Electronics & Information, Jiangsu University of Science & Technology, Zhenjiang Jiangsu 212003, China)

免费全文下载 (已被下载 次)  
获取PDF全文
作者 徐心怡,翟江涛,戴跃伟
机构 江苏科技大学 电子信息学院,江苏 镇江 212003
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2019)03-055-0918-03
DOI 10.19734/j.issn.1001-3695.2017.10.0951
摘要 网络隐写是一种以计算机网络通信数据为载体的隐蔽通信技术。BitTorrent协议的巨大流量使其成为一种极佳的隐写载体,基于BitTorrent协议have消息的隐写即在此背景下提出,目前公开文献尚无有效的检测算法。基于此,提出了一种基于多特征分类的检测方法。该方法首先提取正常have消息数据流,接着提取均值、方差与直方图特征,最后基于AdaBoost分类器给出了检测结果。实验结果表明,所提方法在观测窗口达到 1 000个数据包时对该隐写的识别正确率可达96%,在检测基于have消息的隐写时具有良好效果。
关键词 BitTorrent网络;网络隐写分析;信息安全
基金项目 国家自然科学基金资助项目(61702235,61602247,U1636117,61472188)
江苏省自然科学基金资助项目(BK20150472,BK20160840)
CCF-启明星辰“鸿雁”科研基金资助项目(2016011)
本文URL http://www.arocmag.com/article/01-2019-03-055.html
英文标题 Steganalysis method for have message in BitTorrent protocolXu Xinyi, Zhai Jiangtao, Dai Yuewei(School of Electronics & Information, Jiangsu University of Science & Technology, Zhenjiang Jiangsu 212003, China)
作者英文名 Xu Xinyi, Zhai Jiangtao, Dai Yuewei
机构英文名 SchoolofElectronics&Information,JiangsuUniversityofScience&Technology,ZhenjiangJiangsu212003,China
英文摘要 Network steganography is a kind of computer network communication data as the carrier of the hidden communication technology. BitTorrent protocol of the huge flow makes it an excellent steganographic carrier, based on BitTorrent protocol it proposed the steganography of have message in this context, there is no effective detection algorithm in current public literature. Based on this, this paper presented a multi-feature classification based on the detection method. Firstly, it extracted the method from the normal data stream, then it generated the secret data according to the concealed method, and then extracted the normal data and the dense data. Finally, it gave the detection result based on the AdaBoost classifier. The experimental results show that the accuracy of the proposed method can reach 96% when the observation window reaches 1 000 packets, it has good effect in detecting steganography based on have messages.
英文关键词 BitTorrent network; network steganalysis; information security
参考文献 查看稿件参考文献
  [1] Fridrich J. 数字媒体中的隐写术[M] . 张涛, 奚玲, 张彦, 等译. 北京:国防工业出版社, 2014:2-9. (Fridrich J. Steganography in digital media[M] . Zhang Tao, Xi Ling, Zhang Yan, et al. Beijing:National Defense Industry Press, 2014:2-9. )
[2] Wendzel S, Zander S, Fechner B, et al. Pattern-based survey and categorization of network covert channel techniques[J] . ACM Computing Surveys, 2015, 47(3):article No. 50.
[3] Elzbieta Z, Wojcjech M, Krzysztof S, et al. Trends insteganography[J] . Communications of the ACM, 2014, 57(3):86-95.
[4] Rios R, Onieva J A, Lopez J. Covert communications through network configuration messages[J] . Computers & Security, 2013, 39(4):34-46.
[5] Kiyavash N, Koushanfar F, Colemant P, et al. A timing channel spyware for the CSMA/CA protocol[J] . IEEE Trans on Information Forensics & Security, 2013, 8(3):477-487.
[6] 吕晓鹏, 王文东, 龚向阳, 等. 混合网中的 P2P 资源共享机制[J] . 北京邮电大学学报, 2011, 34(4):113-117. (Lyu Xiao-peng, Wang Wendong, Gong Xiangyang, et al. P2P resource sharing mechanism in hybrid network[J] . Journal of Beijing University of Posts and Telecommunications, 2011, 34(4):113-117. )
[7] 徐钒文. 基于 P2P 的隐蔽匿名通信技术研究[D] . 北京:北京邮电大学, 2012:4-51. (Xu Fanwen. Research on covert anonymous communication technology based on P2P[D] . Beijing:Beijing University of Posts and Telecommunications, 2012:4-51. )
[8] Cunche M, Kaafar M A, Boreli R. Asynchronous covert communication using BitTorrent trackers[C] //Proc of International Conference on High Performance Computing and Communications. Piscataway, NJ:IEEE Press, 2014:213-291.
[9] Praviya B B S, Priyanka S S, Thamarai S V. Hiding of data using steganography technique[J] . International Journal of Engineering Sciences & Research Technology, 2015, 4(2):78-81.
[10] Lampson B W. A note on the confinemeng problem[J] . Communications of the ACM, 1973, 16(10):613-615.
[11] Desimine J, Johnson D, Yuan B, et al. Covert channel in the Bit Torrent tracker protocol[C] //Proc of International Conference on Security and Management. New York:Rochester Institute of Technology, 2012:223-226.
[12] 李自帅, 孙兴明, 王宝威, 等. 一种对等网中的隐写方案[C] //智能信息隐藏与多媒体信号处理国际会议. 2008:20-24. (Li Zishuai, Sun Xingming, Wang Baowei, et al. A steganography scheme in peer-to-peer networks[C] //Proc of Intelligent Information hiding and Multimedia Signal Processing International Conference. 2008:20-24. )
[13] Desimone J, Johnson D, Yuan B. Covert channel in the BitTorrent tracker protocol[EB/OL] . (2012). http://scholarworks. rit. edu/other/300.
[14] 李子帅. 基于BitTorrent网络的信息隐藏技术研究[D] . 长沙:湖南大学, 2009. (Li Zishuai. Research on information hiding technology based on BitTorrent network[D] . Changsha:Hunan University, 2009. )
[15] Zhang Lihua, Liu Guangjie, Zhai Jiangtao, et al. Improving reliability of covert timing channel to packet loss[J] . Journal of Information Hiding & Multimedia Signal Processing, 2015, 6(3):544-553.
[16] 高斌, 翟江涛, 戴跃伟. 基于Bit Torrent协议have消息的信息隐藏方法[J] . 计算机应用, 2017, 37(1):200-205. (Gao Bin, Zhai Jiangtao, Dai Yuewei. Information hiding method based on Bit Torrent protocol have message[J] . Journal of Computer Applications, 2017, 37(1):200-205. )
收稿日期 2017/10/13
修回日期 2017/11/22
页码 918-920,924
中图分类号 TP393
文献标志码 A