Network covert channel construction method based on Web application directory tree

A technology of covert channel and construction method, applied in the field of information hiding, can solve problems such as poor covertness, and achieve the effect of good covertness and good transmission rate

Inactive Publication Date: 2017-03-22
NANJING UNIV OF SCI & TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This new technology allows for easier understanding when communicating over networks like intranets or extraterrestriums (EU). It uses regular requests from clients instead of relying solely upon their own resources. Instead of sending data directly between them, this method improves privacy while still allowing faster communication across network boundaries.

Problems solved by technology

This patented technical solution describes how sensitive or private networks are vulnerable due to their ability to send unauthorised messages over publicly accessible media such as email servers without being detected during legitimate communications sessions. These attacks may involve sending hidden emails with important details about them (such as passwords) along with other types of content like URLs). To prevent these threats from happening, there exist techniques called secure coding systems where users encrypt documents before they leave behind confidentiality. Additionally, existing solutions use special hardware devices known as “fuzzy” logic circuits to detect if any packets containing valuable material were sent across a computer network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network covert channel construction method based on Web application directory tree
  • Network covert channel construction method based on Web application directory tree
  • Network covert channel construction method based on Web application directory tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] Such as figure 1 , figure 2 , image 3 As shown, a method for constructing a network covert channel based on a web application directory tree specifically includes the following steps:

[0026] The first step is to initialize the client program of the network covert channel. The user needs to input parameters at the sender end of the covert channel, including the address of the recipient and the intermediate value of the directory tree height of the selected Web application. The sender of the covert channel bases on these parameters to send covert information, and the entire covert channel construction process is realized through the client program.

[0027] The second step is to embed secret information: encode the concealed information to be sent into a binary bit stream represented by 0 and 1 and encrypt it using the DES encryption algorithm, and then map these bit streams to the server side through the embedding function Among the request operation behaviors of pre

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network covert channel construction method based on a Web application directory tree. The method comprises the following steps: creating a network client program and a server program; embedding secret information in an HTTP request of accessing a node in the Web application directory tree, sending an HTTP data packet to the server through the client program, and transmitting the secret information to the server at the same time; and extracting the secret information by the server through the received HTTP data packet. According to the network covert channel construction method disclosed by the invention, the normal HTTP request is simulated by accessing the Web application of the server, thereby having good imperceptibility, a plurality of Web applications are deployed on a plurality of servers, and the client accesses different Web applications, so that the covert channel has a better transmission rate.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products