毕业设计(论文)题目:
基于 Skype 时间序列模型的时间式隐信道方法设计与实现
一、毕业设计(论文)内容及要求(包括原始数据、技术要求、达 到的指标和应做的实验等)
1.正确安装 Skype 软件和 Wireshark 数据捕获软件,并能实 现数据的捕获和时间序列信息的提取;
2.利用 matlab 软件实现面向 Skype 应用的模型拟合时间式隐信道编 解码算法,并进行实验验证;
3. 设计实现基于信息熵的检测算法用于验证所实现隐信道的安全 性。
二、完成后应交的作业(包括各种说明书、图纸等) 1. 不少于 5000 字的英文翻译;
2. 时间式隐信道软件、熵检测软件;
3. 符合规范的本科毕业论文。
三、完成日期及进度
1. 2017.3.21~2016.4.3 下达任务书,完成英文翻译,开题;
2. 2017.4.4~2017.5.4 完成软件环境的搭建与部分仿真,中期检 查;
3. 2017.5.5~2017.5.15 完成课题规定的全部任务;
4. 2017.5.16~2017.5.25 完成论文写作,准备答辩。
四、主要参考资料(包括书刊名称、出版年月等):
1 Archibald R, Ghosal D. Design and analysis of a model-based Covert Timing Channel for Skype traffic[C]// IEEE Conference on Communications and Network Security.
2015:236-244.
2 Liu Y, Ghosal D, Armknecht F, et al. Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic[M]// Information Hiding. Springer Berlin Heidelberg, 2010:193-207. 3 Liu Y, Ghosal D, Armknecht F, et al. Hide and Seek in Time Robust Covert Timing Channels[M]// Computer Security ESORICS 2009. Springer Berlin Heidelberg, 2009.
4 Zhai J, Wang M, Liu G, et al. Skylen: A Skype-Based Length Covert Channel[J]. Journal of Information Hiding & Multimedia Signal Processing, 2015, 6(3):473-481.
5 武维迪, 兰少华, 田金川, 等.时间划分式网络隐蔽信道的设 计与实现[J].计算机应用研究,2014,31:2502-2505.
6 Zhai Jiangtao , Wang Mingqian , Liu Guangjie , et al.Detecting JitterBug covert timing channel with sparse embedding[J].Security & Communication Networks, 2016,DOI:10.1002/sec.1440.
7 Rezaei F, Hempel M, Rakshit S M, et al. Automated Covert Channel Modeling over a real network platform[C]//International Wireless Communications & Mobile Computing Conference. Nicosia, 2014:559-564.
8 Hovhannisyan H , Lu Kejie , Wang Jianping. A novel high-speed IP-timing covert channel: Design and evaluation[C]//IEEE International Conference on Communications. London, 2015:7198-7203.
9 R. Archibald, D. Ghosal. A Covert Timing Channel Based on Fountain Codes[C]. Proceedings of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. 2012:970-977.
10 Jinzheng Wu, Yongji Wang, Liping Ding, et al. Improving Performance of Network Covert Timing Channel Through Huffman Coding[J]. Mathematical and Computer Modeling. 2012,
55(1-2):69-79.
11 X. Luo, W. W. Edmon, P. Zhou. Robust Network Covert Communications Based on TCP and Enumerative Combinations[J]. IEEE Transaction on Dependable and Secure Computing. 2012, 9(6): 890-902.
12 T. Callahan, M. Allman, M. Rabinovich. Pssst, over here: Communi-cating without fixed infrastructure[C]. Proceedings of IEEE INFOCOM. 2012: 2841-2845.
13 P. Kopiczko, W. Mazurczyk, K. Szczypiorski. StegTorrent: a Steganographic Method for the P2P File Sharing Service[J]. IEEE Security and Privacy Workshops. 2013:151-157.