Application of port hopping technology in network covert communication
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Port hopping is a new type of information hiding technology emerged in recent years,and it has very prosperous development and application prospect in the network covert communication.The port hopping technology features the non-fixed sending and receiving ports,which hop randomly and simultaneously in communication.Compared to the traditional communication with fixed port,the communication using the port hopping technology makes it difficult to discover the port of communication,and even if the port is discovered by the enemy,the communication has already been transferred to another port.Therefore the port hopping is more covert than the traditional technology,and communication using it is difficult to be intercepted.This paper analyzes the basic principles and key technologies of the port hopping,carries on modeling analysis on the port hopping process,and assesses theoretically the system security through the models of the port security,the system availability and the system confidentiality.On this basis,by the use of Windows Sockets technology and VC+ + programming,it designs and implements the session-based port hopping system.Experiment results show that the system successfully makes the data packets diffuse in the background noise of network through the port hopping technology,and effectively reduces the hacker attacks in view of the specific port.At the same time the viability of the system is improved compared with that of the fixed port system.

    Reference
    [1] 李树军.基于协议转变的拒绝服务攻击技术的研究
    [J].计算机应用,2006,26(10):2323-2325LI Shujun.Research on technology of DOS based on pro-tocol transform[J].Journal of Computer Applications,2006,26(10):2323-2325
    [2] 石乐义,贾春福,吕述望.基于端信息跳变的主动网络防护研究[J].通信学报,2008,29(2):106-110 SHI Leyi,JIA Chunfu,LShuwang.Research on endhopping for active network confrontation[J].Journal ofCommunications,2008,29(2):106-110
    [3] 贾春福,林楷,鲁凯.基于端信息跳变DOS攻击防护机制中的插件策略[J].通信学报,2009,30(增刊1):114-118JIA Chunfu,LIN Kai,LU Kai.Plug-in policy for DoS at-tack defense mechanism based on end hopping[J].Jour-nal of Communications,2009,30(sup1):114-118
    [4] 石乐义,贾春福,吕述望.服务跳变系统性能的随机Petri网评价[J].南开大学学报:自然科学版,2009,42(1):72-75SHI Leyi,JIA Chunfu,LShuwang.Performance evaluation for service hopping system using stochastic Petri net
    [J].Acta Scientiarum Naturalium Universitatis Nankaiensis,2009,42(1):72-75
    [5] Lee H C J,Thing V L L.Port hopping for resilient net-works[C] ∥2004 IEEE 60th Vehicular Technology Conference,2004:3291-3295
    [6] Badishi G,Herzberg A,Keidar I.Keeping denial-of-service attackers in the dark[C] ∥International SymposiumDistributed Computing(DISC),Springer-Verlag,2005:18-31
    [7] Sifalakis M,Schmid S,Hutchison D.Network addresshopping:A mechanism to enhance data protection forpacket communications[C] ∥2005 IEEE InternationalConference on Communications,2005:1518-1523
    [8] Atighetchi M,Pal P,Webber F,et al.Adaptive use ofnetwork-centric mechanisms in cyber-defense[C] ∥Proceedings of the 6th IEEE International Symposium on Objectoriented Real-time Distributed Computing,2003:183-192
    [9] Savage S,Wetherall D,Karlin A,et al.Practical networksupport for ip traceback[J].Proceedings of the Conference on Applications,Technologies,Architectures,andProtocols for Computer Communication,2000,30(4):295-306
    [10] Wang J,Lu L Y,Chien A A.Tolerating denial of serviceattacks using overlay networks:Impact of overlay networktopology[C] ∥Proceedings of the 1st ACM Workshop onSurvivable and Selfregenerative Systems,Fairfax VA,2003:43-52
    [11] Shi L Y,Jia C F,Lv S W,et al.Port and address hoppingfor active cyber-defense[C] ∥Proceedings of the 2007 Pacific Asia Conference on Intelligence and Security Informatics,Chengdu,2007,LNCS 4430:295-300
    [12] Shi L Y,Jia C F,Lv S W,et al.DOS evading mechanismupon service hopping[C] ∥Proceedings of the 2007 IFIPInternational Conference on Network and Parallel Computing Workshops,2007:119-122
    [13] The U S.Secret service and Carnegie melons universitysoftware engineering institute's CERTprogram and Microsoft cooperation,2007 Ecrime watch survey[EB/OL]
    [2011-06-26].http:∥www.cert.org/archive/pdf/ecrimesummary07
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

XIE Hui, ZHANG Zhigang, LI Jing. Application of port hopping technology in network covert communication[J]. Journal of Nanjing University of Information Science & Technology,2012,4(3):254-257

Copy
Share
Article Metrics
  • Abstract:1464
  • PDF: 2814
  • HTML: 0
  • Cited by: 0
History
  • Received:July 27,2011
Article QR Code

Address:No. 219, Ningliu Road, Nanjing, Jiangsu Province

Postcode:210044

Phone:025-58731025