毕业论文

打赏
当前位置: 毕业论文 > 任务书 >

时间式隐信道方法设计任务书

时间:2024-05-22 21:40来源:95452
时间式隐信道方法设计任务书。正确安装Skype软件和Wireshark数据捕获软件,并能实现数据的捕获和时间序列信息的提取利用matlab软件实现面向Skype应用的模型拟合时间式隐信道编解码算法

毕业设计(论文)题目:

基于 Skype 时间序列模型的时间式隐信道方法设计与实现

一、毕业设计(论文)内容及要求(包括原始数据、技术要求、达 到的指标和应做的实验等)

1.正确安装 Skype 软件和 Wireshark 数据捕获软件,并能实 现数据的捕获和时间序列信息的提取;

2.利用 matlab 软件实现面向 Skype 应用的模型拟合时间式隐信道编 解码算法,并进行实验验证;

3. 设计实现基于信息熵的检测算法用于验证所实现隐信道的安全 性。

二、完成后应交的作业(包括各种说明书、图纸等) 1. 不少于 5000 字的英文翻译

2. 时间式隐信道软件、熵检测软件;

3. 符合规范的本科毕业论文

三、完成日期及进度

1. 2017.3.21~2016.4.3 下达任务书,完成英文翻译,开题

2. 2017.4.4~2017.5.4 完成软件环境的搭建与部分仿真,中期检 查;

3. 2017.5.5~2017.5.15 完成课题规定的全部任务;

4. 2017.5.16~2017.5.25 完成论文写作,准备答辩。

四、主要参考资料(包括书刊名称、出版年月等):

1 Archibald R, Ghosal D. Design and analysis of a model-based Covert Timing Channel for Skype traffic[C]// IEEE Conference on Communications and Network Security.

2015:236-244.

2 Liu Y, Ghosal D, Armknecht F, et al. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic[M]// Information Hiding. Springer Berlin Heidelberg, 2010:193-207. 3 Liu Y, Ghosal D, Armknecht F, et al. Hide and Seek in Time Robust Covert Timing Channels[M]// Computer Security ESORICS 2009. Springer Berlin Heidelberg, 2009.

4 Zhai J, Wang M, Liu G, et al. Skylen: A Skype-Based Length Covert Channel[J]. Journal of Information Hiding & Multimedia Signal Processing, 2015, 6(3):473-481.

5 武维迪, 兰少华, 田金川, 等.时间划分式网络隐蔽信道的设 计与实现[J].计算机应用研究,2014,31:2502-2505.

6 Zhai Jiangtao , Wang Mingqian , Liu Guangjie , et al.Detecting JitterBug covert timing channel with sparse embedding[J].Security & Communication Networks, 2016,DOI:10.1002/sec.1440.

7 Rezaei F, Hempel M, Rakshit S M, et al. Automated Covert Channel Modeling over a real network platform[C]//International Wireless Communications & Mobile Computing Conference. Nicosia, 2014:559-564.

8 Hovhannisyan H , Lu Kejie , Wang Jianping. A novel high-speed IP-timing covert channel: Design and evaluation[C]//IEEE International Conference on Communications. London, 2015:7198-7203.

9 R. Archibald, D. Ghosal. A Covert Timing Channel Based on Fountain Codes[C]. Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. 2012:970-977.

10 Jinzheng Wu, Yongji Wang, Liping Ding, et al. Improving Performance of Network Covert Timing Channel Through Huffman Coding[J]. Mathematical and Computer Modeling. 2012,

55(1-2):69-79.

11 X. Luo, W. W. Edmon, P. Zhou. Robust Network Covert Communications Based on TCP and Enumerative Combinations[J]. IEEE Transaction on Dependable and Secure Computing. 2012, 9(6): 890-902.

12 T. Callahan, M. Allman, M. Rabinovich. Pssst, over here: Communi-cating without fixed infrastructure[C]. Proceedings of IEEE  INFOCOM. 2012: 2841-2845.

13 P. Kopiczko, W. Mazurczyk, K. Szczypiorski. StegTorrent: a Steganographic Method for the P2P File Sharing Service[J]. IEEE Security and Privacy Workshops. 2013:151-157. 时间式隐信道方法设计任务书:http://www.youerw.com/renwushu/lunwen_203959.html

------分隔线----------------------------
推荐内容