信息网络安全 ›› 2016, Vol. 16 ›› Issue (1): 34-39.doi: 10.3969/j.issn.1671-1122.2016.01.007

• • 上一篇    下一篇

一种基于TCP协议的网络隐蔽传输方案设计

娄嘉鹏1, 张萌1, 付鹏2, 张开2   

  1. 1. 北京电子科技学院,北京 100070
    2. 西安电子科技大学计算机学院,陕西西安 710071
  • 收稿日期:2015-11-30 出版日期:2016-01-01 发布日期:2020-05-13
  • 作者简介:

    作者简介: 娄嘉鹏(1977-),男,山东,讲师,硕士,主要研究方向为信息安全、网络安全;张萌(1988-),男,河南,硕士研究生,主要研究方向为信息安全;付鹏(1990-),男,江西,硕士研究生,主要研究方向为信息安全;张开(1992-),男,山西,硕士研究生,主要研究方向为信息安全。

  • 基金资助:
    基金项目: 国家高科技研究发展计划(国家863计划)[2012AA013102];新闻出版重大科技工程[GXTC-CZ-1015004/05]

Design of Network Covert Transmission Scheme Based on TCP

Jiapeng LOU1, Meng ZHANG1, Peng FU2, Kai ZHANG2   

  1. 1. Beijing Electronic Science & Technology Institute, Beijing 100070, China
    2. IT Academy, Xidian University, Xi’an Shaanxi 710071, China
  • Received:2015-11-30 Online:2016-01-01 Published:2020-05-13

摘要:

随着互联网的高速发展,以木马入侵为主的网络安全问题也越来越受到重视,隐蔽传输是木马等恶意代码利用的重要技术。网络隐蔽信道在带来危害的同时,也能带来正向利用,通过网络隐蔽信道可以进行信息的隐蔽、安全传输,也可以利用网络隐蔽信道对现有的系统防护设施性能进行测试,因此研究隐蔽信道对网络防护有着重要意义。文章通过研究网络协议、网络防护技术、网络隐蔽传输的实现原理和工作机制,网络协议本身存在的一些技术缺陷,通信系统的构成要素,提出了一种基于TCP协议的网络隐蔽传输方法,进而构建了一种网络隐蔽传输信道,该信道能够绕过防火墙和入侵检测系统进行隐蔽信息的传输。文章设计并实现了该方法,对该方法进行测试和验证,实验证明该信道的隐蔽性较高、传输速度较快,可实现信息的隐蔽传输,从而证明方案的可行性。该方法为防护木马等恶意攻击提供了理论依据和技术支持,在网络安全防护上有一定的意义。

关键词: 网络安全, TCP协议, 隐蔽传输

Abstract:

With the rapid development of the Internet, the network security issue based on Trojan invasion has been more attention. Covert transmission is important technology used by Trojans and other malicious. Network covert channel brings us harm, but also brings forward for our use. We can transmit information covertly and safely by network covert channel, also can test the performance of protection facilities of the existing system. So research covert channel has great significance for network protection. This paper researches network protocol, network protection technology, the principle and working mechanism of hidden transmission network, some technical flaws of network protocol and elements of the communication system, proposes a network covert transmission method based on the TCP protocol, in order to build a network covert channel. The channel can bypass firewalls and intrusion detection systems to transmit hidden information. This paper designs and implements the method and the method is tested and verified. The experiments prove that the channel has a high concealment and transmission speed. The method provides a theoretical basis and technical support for protection Trojans and other malicious attacks. It has certain significance for network security.

Key words: network security, TCP, covert transmission

中图分类号: