浏览全部资源
扫码关注微信
1. 浙江工业大学计算机科学与技术学院,浙江 杭州 310023
2. 浙江省网络空间安全创新研究中心,浙江 杭州 310023
3. 之江实验室工业互联网研究中心,浙江 杭州 311100
[ "马栋捷(1994- ),男,浙江工业大学计算机科学与技术学院硕士生,主要研究方向为信息安全。" ]
[ "金成强(1995- ),男,浙江工业大学计算机科学与技术学院硕士生,主要研究方向为信息安全。" ]
[ "陈园(1994- ),女,浙江工业大学计算机科学与技术学院硕士生,主要研究方向为物联网安全。" ]
[ "陈铁明(1978- ),男,博士,浙江工业大学计算机科学与技术学院教授,主要研究方向为网络空间安全与大数据智能分析。" ]
网络出版日期:2019-09,
纸质出版日期:2019-09-20
移动端阅览
马栋捷, 金成强, 陈园, 等. GreyFan:一种Wi-Fi隐蔽信道攻击框架[J]. 电信科学, 2019,35(9):85-97.
Dongjie MA, Chengqiang JIN, ·uan CHEN, et al. GreyFan:a network attack framework using Wi-Fi covert channel[J]. Telecommunications science, 2019, 35(9): 85-97.
马栋捷, 金成强, 陈园, 等. GreyFan:一种Wi-Fi隐蔽信道攻击框架[J]. 电信科学, 2019,35(9):85-97. DOI: 10.11959/j.issn.1000-0801.2019179.
Dongjie MA, Chengqiang JIN, ·uan CHEN, et al. GreyFan:a network attack framework using Wi-Fi covert channel[J]. Telecommunications science, 2019, 35(9): 85-97. DOI: 10.11959/j.issn.1000-0801.2019179.
针对现实网络中诸如侧信道攻击、HID 攻击等传统的物理攻击,物理隔离被认为是一种较为彻底的抵御网络攻击的安全防护手段。2018 年,业界首次提出了一种物理隔离环境下的 Wi-Fi 隐蔽信道方法——Ghost Tunnel,即在Wi-Fi尚未连接的状态下,无线AP可成功将数据传给发起连接请求的计算机。提出了一种基于Ghost Tunnel方法的攻击框架—— GreyFan,利用该攻击框架攻击者可以对未连接Wi-Fi的用户实施无感知攻击,如文件隐蔽传输、任意代码执行等,并分析了相应的防御技术。
For traditional physical attacks such as side channel attacks and HID attacks in real networks
physical isolation is considered to be a relatively complete security protection against network attacks.In 2018
a Wi-Fi hidden channel method in the physical isolation environment——Ghost Tunnel was firstly proposed
that is
in the state that Wi-Fi didn’t connected
the wireless AP could successfully transmit data to the computer that initiates the connection request.An attack framework based on the Ghost Tunnel method——GreyFan was proposed.This attack framework enabled attackers to implement non-aware attacks on users who didn’t connected to Wi-Fi
such as file concealed transmission and arbitrary code execution
etc.The corresponding defense technology was also analyzed.
DAKHANE D M , DESHMUKH P R . Active warden for TCP sequence number base covert channel [C ] // International Conference on Pervasive Computing,Jan 8-10,2015,Pune,India . Piscataway:IEEE Press , 2015 : 1 - 5 .
ZANDER S , ARMITAGE G , BRANCH P . Covert channels and countermeasures in computer network protocols [J ] . IEEE Communications Surveys & Tutorials , 2007 , 9 ( 3 ): 44 - 57 .
王娟 , 郭永冲 , 王强 , 等 . 基于BHO的网络隐蔽通道研究 [J ] . 计算机工程 , 2009 , 35 ( 5 ): 159 - 161 ,164.
WANG J , GUO · C , WANG Q , et al . Research of network covert channel based on BHO [J ] . Computer Engineering , 2009 , 35 ( 5 ): 159 - 161 ,164.
AHMADZADEH S A , AGNEW G . Turbo covert channel:an iterative framework for covert communication over data networks [C ] // IEEE INFOCOM,April 14-19,2013,Turin,Italy . Piscataway:IEEE Press , 2013 : 2031 - 2039 .
姬国珍 , 谭全福 . 基于数据包时间间隔的隐蔽通道实现及检测方法研究 [J ] . 通信技术 , 2018 , 51 ( 1 ): 189 - 194 .
JI G Z , TAN Q F . Covert channel implementation based on between-packet time intervals and detection method [J ] . Communications Technology , 2018 , 51 ( 1 ): 189 - 194 .
李卫 , 嵩天 . 适用于NAT环境的隐蔽通道构建方法 [J ] . 计算机工程与应用 , 2018 , 54 ( 17 ): 103 - 109 .
LI W , SONG T . Covert channel applying to NAT environment [J ] . Computer Engineering and Applications , 2018 , 54 ( 17 ): 103 - 109 .
朱越凡 , 马迪 , 王伟 , 等 . 一种 NTP 协议隐蔽通道 [J ] . 计算机系统应用 , 2017 , 26 ( 5 ): 119 - 125 .
ZHU · F , MA D , WANG W , et al . Covert channel based on NTP protocol [J ] . Computer Systems & Applications , 2017 , 26 ( 5 ): 119 - 125 .
TAN · A , XU X , LIANG C , et al . An end-to-end covert channel via packet dropout for mobile networks [J ] . International Journal of Distributed Sensor Networks , 2018 , 14 ( 5 ).
·ANG Z , HUANG Q , ZHANG Q , et al . NICScatter:backscatter as a covert channel in mobile devices [Z ] . 2017 .
SCHULZ M , LINK J . Shadow Wi-Fi:teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi [C ] // The 16th Annual International Conference on Mobile Systems,Applications,and Services Table of Contents,June 10-15,2018,San Francisco,California,USA.[S.l.:s.n] . 2018 : 256 - 268 .
WU K , WEI Z S , TEACHER W Z . A study on the application of intrusion detection technology to WLAN [C ] // IEEE International Conference on Communication Software and Networks,May 27-29,2011,Xi’an,China . Piscataway:IEEE Press , 2011 : 344 - 346 .
谭彦 , 厉萍 , 卢洪涛 , 等 . Wi-Fi 无线钓鱼攻击分析及应对技术研究 [J ] . 电信科学 , 2013 , 29 ( Z2 ): 143 - 146 ,151.
TAN · , LI P , LU H T , et al . Wi-Fi wireless phishing attack analysis and coping technology research [J ] . Telecommunications Science , 2013 , 29 ( Z2 ): 143 - 146 ,151.
高波 , 潘毅明 , 黄国瑾 . 基于城域组网的运营级WLAN组网技术 [J ] . 电信科学 , 2015 , 31 ( 10 ): 199 - 203 .
GAO B , PAN · M , HUANG G J . Technology of WLAN in operation level based on metropolitan area network [J ] . Telecommunications Science , 2015 , 31 ( 10 ): 199 - 203 .
0
浏览量
289
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构