[1]Wang Yumin, Zhang Tong, Huang Jiwu. Information hiding—Theory and technology[M].Beijing:Tsinghua University Press, 2006.(in Chinese)
[2]Yang Zhidan, Liu Kesheng, Wang Kang. Network covert channel technique based on IP header option[J]. Computer Engineering,2009,35(13):125127.(in Chinese)
[3]Lu Dahang.The research and implementation of covert channel based on network protocols[J]. Computer Engineering and Applications,2003,39(2):183186.(in Chinese)
[4]Lv Tao, Cao Tianjie. Approach of covert channel based on TCP protocol[J]. Computer Security, 2010(5):5155.(in Chinese)
[5]Hu Huaping, Du Kun, Liu Bo, et al. Design and implementation of a firewall penetration system based on TCP packets[J]. Computer Engineering & Science,2007,29 (5):47.(in Chinese)
[6]Li Liping,Wang Jianhua. Implementation of secret communication with covert channels in network traffic[J]. Computer Science, 2009,36(5):115117.(in Chinese)
[7]Zhang Wei, Wang Tao, PAN Yanhui, et al. Data packet capture and applications based on WinPcap[J]. Computer Engineering & Design,2007,29(7):16491651.(in Chinese)
[8]Luo Qinglin, Xu Kefu, Zang Wenyu, et al. Network protocol parser and verification method based on Wireshark[J]. Computer Engineering & Design,2011,32(3):770773.(in Chinese)
附中文参考文献:
[1]王育民,张彤,黄继武.信息隐藏——理论与技术[M].北京:清华大学出版社,2006.
[2]杨智丹,刘克胜,王康.基于IP报头选项的网络隐蔽通道技术[J].计算机工程,2009,35(13):125127.
[3]卢大航. 基于网络协议的隐蔽通道研究与实现[J].计算机工程与应用,2003,39(2):183186.
[4]吕涛,曹天杰.基于TCP协议的隐蔽通道研究[J].计算机安全,2010(5):5155.
[5]胡华平,杜昆,刘波,等.基于TCP报文的防火墙渗透测试系统的设计与实现[J].计算机工程与科学,2007,29 (5):47.
[6]李丽萍,王建华.网络传输中采用隐蔽通道实现秘密通信[J].计算机科学,2009,36(5):115117.
[7]张伟,王韬,潘艳辉,等. 基于WinPcap的数据包捕获及设计[J].计算机工程与设计,2007,29(7):16491651.
[8]罗青林,徐克付,臧文羽,等. Wireshark环境下的网络协议解析与验证方法[J].计算机工程与设计,2011,32(3):770773. |