计算机科学 ›› 2014, Vol. 41 ›› Issue (8): 192-196.doi: 10.11896/j.issn.1002-137X.2014.08.042

• 信息安全 • 上一篇    下一篇

基于随机性检测的链路层加密数据盲识别方案

吴杨,马云飞,王韬,邢萌   

  1. 军械工程学院信息工程系 石家庄050003;郑州大学信息管理系 郑州450001;军械工程学院信息工程系 石家庄050003;军械工程学院信息工程系 石家庄050003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受军内科研项目(YJJXM12033)资助

Independent Identification of Encrypted Data in Data Link Layer Based on Randomness Test

WU Yang,MA Yun-fei,WANG Tao and XING Meng   

  • Online:2018-11-14 Published:2018-11-14

摘要: 为识别链路层加密数据,构建了以块内频数检测为主的链路层加密数据盲识别方案。针对分块长度影响块内频数检测识别率的问题,提出了基于方差原理的比特序列分块长度值选择方案。针对块内频数检测对长度较短的比特序列的识别能力有限的问题,提出了基于随机抽样原理的比特序列信息提取方法,以提高对未加密比特序列的识别率。最后,以某无线网络链路层数据的识别为例,对提出的方案进行了验证。结果表明,提出的方案对链路层加密数据具有较高的识别率,相关成果可为进一步的协议识别技术研究打下基础。

关键词: 链路层,加密数据,块内频数检测,方差原理,随机抽样

Abstract: To identify the encrypted data of data link layer,an independent identification scheme was proposed by mainly using the technique of frequency test within a block.As the identification rate of frequency test within a block is impressionable to the size of the block,a block size chosen scheme was provided based on the principle of variance.Furthermore,as the identification ability of frequency test within a block is also limited to short bit sequence,random sampling was introduced into its information extraction process to heighten the identification rate.Eventually,by taking the link layer bit sequence of a wiriness network as the identification object,the identification rate of the proposed schemes was verified.Experimental results demonstrate that the proposed schemes have high rates to identify encrypted data of data link layer and the correlative research paves the way for the further protocol identification research.

Key words: Data link layer,Encrypted data,Frequency test within a block,Variance principle,Random sampling

[1] 陈亮,龚俭,徐选.应用层协议识别算法综述[J].计算机科学,2007,4(7):73-75
[2] 吴志军,阚洪涛.基于ECC的TES网络链路层安全协议的研究[J].通信学报,2009,30(11):86-92
[3] 张杨.基于NDIS的数据链路层加密[J].辽宁大学学报,2010,37(2):116-118
[4] DOD(Department of Defense).MIL-STD-188-220C[EB/OL].http://www.everyspec.com,2012-06-29
[5] Charles V W,Fabian M,Gerald M M.On inferring application protocol behaviors in encrypted network traffic[J].Journal of Machine Learning Research,2006,7(12):2745-2769
[6] Sun Guang-lu,Xue Yi-bo,Dong Ying-fei,et al.A Novel Hybrid Method for Effectively Classifying Encrypted Traffic[C]∥Proceedings of Communications and Systems Security,2010(GLOBECOM 2010) .Miami USA:IEEE,2010:1-5
[7] 赵博,郭虹,刘勤让,等.基于加权累积和检验的加密流量盲识别算法[J].软件学报,2013,24(6):1334-1345
[8] Menezes Alfred J,van Oorschot P C,Vanstone S A.应用密码学手册[M].胡磊,王鹏,等译.北京:电子工业出版社,2005
[9] 胡俭勇,苏锦海.一种随机性实时检测方案[J].计算机工程,2009,34(9):136-138
[10] Rukhin A,Soto J,Nechvatal J.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R].Technical Report.SP 2001:800-22
[11] Filiol E.A new statistical testing for symmetric ciphers and hash functions[C]∥Information and Communications Security:4th International Conference.Berlin:Springer,2002:342-353
[12] NIST FIPS PUB 140-2-2001.Security Requirements for Cryptographic Modules[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2001
[13] NIST SP800-22.A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Revision 1a[S].Washington DC,USA:National Institute of Standards and Technology,http://csrc.nist.gov,2010

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!