首页> 外文会议>International security protocols workshop >Covert Communications Despite Traffic Data Retention
【24h】

Covert Communications Despite Traffic Data Retention

机译:尽管保留了流量数据但仍进行秘密通信

获取原文

摘要

We show that Alice and Bob can communicate covertly and anonymously, despite Eve having access to the traffic data of most machines on the Internet. Our protocols take advantage of small amounts of shared state that exist in many TCP/IP stacks, and use them to construct a covert channel. Techniques inspired from Direct Sequence Spread Spectrum (DSSS) are used to make sure that the communication is covert and resistant to noise. We implement a prototype based on ICMP Echo (ping) to illustrate the practicality of our approach and discuss how a more complex protocol would modulate information through the use of TCP features to make communication detection very difficult. The feasibility of covert communications despite stringent traffic data retention, has far reaching policy consequences.
机译:我们证明,尽管Eve可以访问Internet上大多数计算机的流量数据,但Alice和Bob可以秘密地和匿名地进行通信。我们的协议利用了许多TCP / IP堆栈中存在的少量共享状态,并使用它们来构造隐蔽通道。直接序列扩频(DSSS)启发的技术被用来确保通信是秘密的并且抗噪声。我们实现了一个基于ICMP Echo(ping)的原型,以说明我们方法的实用性,并讨论了更复杂的协议如何通过使用TCP功能来调制信息,从而使通信检测变得非常困难。尽管严格保留了交通数据,但隐蔽通信的可行性已对政策产生了深远的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号