信息网络安全 ›› 2020, Vol. 20 ›› Issue (6): 57-64.doi: 10.3969/j.issn.1671-1122.2020.06.007

• 技术研究 • 上一篇    下一篇

基于HTTP协议组合的隐蔽信道构建方法研究

陈骋1, 罗森林1, 吴倩2(), 杨鹏2   

  1. 1.北京理工大学信息系统及安全对抗实验中心,北京 100081
    2.国家计算机网络与信息安全管理中心,北京 100094
  • 收稿日期:2019-07-01 出版日期:2020-06-10 发布日期:2020-10-21
  • 通讯作者: 吴倩 E-mail:wuqian@cert.org.cn
  • 作者简介:陈骋(1994—),男,浙江,硕士研究生,主要研究方向为信息安全|罗森林(1968—),男,河北,教授,博士,主要研究方向为信息安全、数据挖掘、文本安全|吴倩(1987—),女,山东,博士,主要研究方向为信息安全|杨鹏(1982—),男,内蒙古,高级工程师,博士,主要研究方向为信息安全、人工智能
  • 基金资助:
    国家242信息安全计划(2017A149)

Research on Covert Channel Construction Method Based on HTTP Protocol Combination

CHEN Cheng1, LUO Senlin1, WU Qian2(), YANG Peng2   

  1. 1. Information System & Security and Countermeasures Experiments Center, Beijing Institute of Technology, Beijing 100081, China
    2. National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing 100094, China
  • Received:2019-07-01 Online:2020-06-10 Published:2020-10-21
  • Contact: WU Qian E-mail:wuqian@cert.org.cn

摘要:

针对现有的存储型隐蔽信道隐蔽性较低,时间型隐蔽信道误码率高且传输速率较低的问题,文章提出一种基于HTTP协议组合的隐蔽信道构建方法。该方法通过模拟浏览器应用发送HTTP请求,将HTTP请求动态分配在不同浏览器上,利用数学组合的方式嵌入隐蔽信息,且对访问对象、数据包时间间隔和数据包长度进行动态调整,提高了信道的隐蔽性。同时,信道基于TCP协议内部的可靠传输使其不受网络抖动的影响,从而保证信道的可靠性。实验结果表明,该方法能够抵御基于应用签名的检测法、协议指纹检测法及组合模型检测法,具有较强的隐蔽性;能够根据应用场景调整隐蔽性强度与信道容量的平衡。

关键词: 隐蔽信道, 数学组合编码, HTTP协议

Abstract:

Aiming at the problem that the existing covert storage channel has a low concealment, and the covert timing channel has a high bit error rate and a low transmission rate, a covert channel construction method combining HTTP protocol behaviors is proposed. In the method, HTTP requests are sent by simulating a browser application and allocated dynamically among different browsers, the concealed information is embedded by means of mathematical combination. The access object, the packet time interval and the packet length are also dynamically adjusted to improve the concealment of channel. At the same time, the channel is based on the reliable transmission of TCP protocol, so that it is not affected by the network jitter, thus ensuring the reliability of the channel. The experimental results show that the proposed method can resist the application signature based detection method, protocol fingerprint detection method and combined model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario.

Key words: covert channel, mathematical combination coding, HTTP protocol

中图分类号: