SlideShare a Scribd company logo
1 of 16
Download to read offline
‫ﺍﻟﻤﺠﻠﺩ‬ ‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎﺕ‬ ‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻟﻌﻠﻭﻡ‬ ‫ﺍﻟﺭﺍﻓﺩﻴﻥ‬ ‫ﻤﺠﻠﺔ‬)٨(‫ﺍﻟﻌﺩﺩ‬)٢(٢٠١١
٣٥
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
‫ﻤ‬‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﻴﻭﻨﺱ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﺃﻤﻴﺭﺓ‬
‫ﺍﻟﺤﺎﺴ‬ ‫ﻋﻠﻭﻡ‬ ‫ﻜﻠﻴﺔ‬‫ﻭ‬‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎ‬ ‫ﺏ‬‫ﺕ‬‫ﺍﻟﺠﺎﻤﻌﺔ‬ ‫ﺭﺌﺎﺴﺔ‬
‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬
‫ﺍﻟﺒﺤﺙ‬ ‫ﺍﺴﺘﻼﻡ‬ ‫ﺘﺎﺭﻴﺦ‬:٢٨/٠٤/٢٠١٠‫ﺍﻟﺒﺤﺙ‬ ‫ﻗﺒﻭل‬ ‫ﺘﺎﺭﻴﺦ‬:٢١/٠٦/٢٠١١
ABSTRACT
The covert channels of type covert storage channels were used in this research to
hide textual data or an (image hiding secrete data) in the transmission protocol layer and
the internet protocol layer of TCP/IP module. We use IP protocol in designing covert
channel by using Identification field, and use TCP protocol in designing covert channel
by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP
protocol by using Echo request message and Message field.
The result of Covert channel after analyzing the protocols (IP, TCP, UDP,
ICMP) header depends on the field that used in the designing the Covert channel. The
access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the
other hand depends on a mechanism of unsafe communication. ICMP protocol provided
a good transmission, though unreliable, in that the message structure can be unreliable
or clear.
‫ﺍﻟﻤﻠﺨﺹ‬
‫ـﺔ‬‫ﺍﻟﻤﺨﻔﻴـ‬ ‫ـﺯﻥ‬‫ﺍﻟﺨـ‬ ‫ـﺎﺓ‬‫ﻗﻨـ‬ ‫ـﻭﻉ‬‫ﻨـ‬ ‫ـﻥ‬‫ﻤـ‬ ‫ـﺔ‬‫ﺍﻟﻤﺨﻔﻴـ‬ ‫ـﻭﺍﺕ‬‫ﺍﻟﻘﻨـ‬ ‫ـﺘﺨﺩﺍﻡ‬‫ﺍﺴـ‬ ‫ـﺙ‬‫ﺍﻟﺒﺤـ‬ ‫ـﺫﺍ‬‫ﻫـ‬ ‫ـﻲ‬‫ﻓـ‬ ‫ـﻡ‬‫ﺘـ‬
)Covert Storage Channel(‫ﺼﻭﺭﺓ‬ ‫ﺃﻭ‬ ‫ﻨﺼﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬‫ﺨﻔﻰ‬‫ﻤ‬‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺴﺭﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻓﻴﻬﺎ‬
‫ﻨﻤﻭﺫﺝ‬ ‫ﻓﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﻭﻁﺒﻘﺔ‬ ‫ﺍﻟﻨﻘل‬TCP/IP‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﺤﻴﺙ‬ ،IP‫ﻤﺨﻔﻴـﺔ‬ ‫ﻗﻨـﺎﺓ‬ ‫ﺘـﺼﻤﻴﻡ‬ ‫ﻓـﻲ‬
‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Identification‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ،TCP‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬
‫ﺍ‬ ‫ﻤﺅﺸﺭ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﻟﺤﺎﻟﺔ‬Urgent Pointer‫ﻭﺒﺭﻭﺘﻭﻜﻭل‬ ،UDP‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻤﻨﻔﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Source Port،
‫ﺍﻟﺒﺭﺘﻭﻜﻭل‬ ‫ﻭﺃﺨﻴﺭﺍ‬ICMP‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﻫﻴﻜﻠﻴﺔ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Echo Request‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺤﻘل‬Message.
‫ﺘـﺼﻤﻴﻡ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺘﺤﻠﻴل‬ ‫ﺒﻌﺩ‬ ‫ﻅﻬﺭﺕ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﻜﺎﻨﺕ‬
‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻟﻴﻥ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺼﻭل‬ ‫ﻭﻨﺴﺒﺔ‬ ،‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺤﻘل‬ ‫ﻋﻠﻰ‬ ‫ﺍﻋﺘﻤﺩﺕ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬
IP‫ﻭ‬TCP%100،‫ﺃﻤﺎ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬UDP‫ﻋﻠﻰ‬ ‫ﻓﻴﻌﺘﻤﺩ‬‫ﺁﻟﻴ‬‫ﺔ‬،‫ﹰ‬‫ﺎ‬‫ﻤﻭﺜﻭﻗ‬ ‫ﹰ‬‫ﻻ‬‫ﺍﺘﺼﺎ‬ ‫ﺘﺅﻤﻥ‬ ‫ﻻ‬ ‫ﺍﻟﺘﻲ‬ ‫ﻋﻤﻠﻪ‬‫ﺃﻤﺎ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬
ICMP‫ﻤﻘﺒﻭﻻ‬ ‫ﺇﺭﺴﺎﻻ‬ ‫ﻭﻓﺭ‬ ‫ﻓﺄﻨﻪ‬‫ﻤﻌﺭﻭﻓـﺔ‬ ‫ﺘﻜـﻭﻥ‬ ‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﻻﻥ‬ ‫ﻭﺫﻟﻙ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺒﻌﺙ‬ ‫ﻭﻟﻜﻨﻪ‬
‫ﻭﻭﺍﻀﺤﺔ‬.
1-‫ﺍﻟﻤﻘﺩﻤﺔ‬
،‫ﺃﻫﻤﻴﺘﻬـﺎ‬ ‫ﻭﺍﺯﺩﻴﺎﺩ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺜﻭﺭﺓ‬ ‫ﻋﺼﺭ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻤﻊ‬ ‫ﻟﻠﺘﻌﺎﻤل‬ ‫ﺍﻟﺠﺩﻴﺩﺓ‬ ‫ﺍﻟﺒﻴﺌﺔ‬ ‫ﻫﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺸﺒﻜﺔ‬
‫ﻭﻴ‬‫ﺨﺼﻭﺼﻴﺔ‬ ‫ﻭﺤﻤﺎﻴﺔ‬ ‫ﺤﻤﺎﻴﺘﻬﺎ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺠﺎﺩ‬ ‫ﺍﻟﺘﻔﻜﻴﺭ‬ ‫ﺘﻭﺠﺏ‬‫ﺍﻷﻓﺭﺍﺩ‬‫ﺘﻌﺩ‬ ‫ﻟﻡ‬ ‫ﻟﺫﻟﻙ‬ ،‫ﻋﻠﻴﻬﺎ‬ ‫ﺍﻟﻌﺎﻤﻠﻴﻥ‬‫ﺍﻷﻤﻨﻴﺔ‬‫ﻤﺘﻌﻠﻘﺎ‬ ‫ﻤﻭﻀﻭﻋﺎ‬
‫ﺍﻟﺴﻴﺎﺴﺎﺕ‬ ‫ﻭﻭﻀﻊ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺒﻁﺭﺍﺌﻕ‬‫ﺍﻷﻤﻨﻴﺔ‬‫ﺍﻻﺘﺼﺎﻻﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺜﻐﺭﺍﺕ‬ ‫ﻋﻥ‬ ‫ﻭﺍﻟﺒﺤﺙ‬‫ﻭﺇﻨﻤﺎ‬‫ﺍﻟﻤـﺭﻭﺭ‬ ‫ﺃﻤﻨﻴﺔ‬
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٣٦
‫ﹰ‬‫ﺎ‬‫ﺃﻴﻀ‬‫ﻏ‬ ‫ﻭﺃﻥ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻓﻲ‬ ‫ﹰ‬‫ﺍ‬‫ﻤﻭﺠﻭﺩ‬ ‫ﺠﻭﻫﺭﻫﺎ‬ ‫ﻴﻜﻭﻥ‬ ‫ﺍﻟﺘﻲ‬،‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﻤﺤﺘﻭﻯ‬ ‫ﺤﻤﺎﻴﺔ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺎﻴﺔ‬‫ﺃﻤـﺎ‬‫ﻏﺎﻴـﺔ‬
‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺠﻭﺩ‬ ‫ﺃﺨﻔﺎﺀ‬ ‫ﻓﻬﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.[6]
،‫ﻤﺤﻭﺭﻴﻥ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻴﺘﻨﺎﻭل‬‫ﺍﻷﻭل‬‫ﻭﺍﻟﻨﻤـﻭﺫﺝ‬ ‫ﻟﻬـﺎ‬ ‫ﺍﻟﻬﺭﻤﻴـﺔ‬ ‫ﻭﺍﻟﺒﻨﻴـﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﹰ‬‫ﺎ‬‫ﺘﻌﺭﻴﻔ‬ ‫ﺘﻀﻤﻥ‬
TCP/IP‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻟﻤﺠﻤﻭﻋﺔ‬ ‫ﹰ‬‫ﺎ‬‫ﻭﺸﺭﺤ‬TCP/IP.‫ﺃﻤﺎ‬‫ﺍ‬ ‫ﻋـﻥ‬ ‫ﻤﻘﺩﻤـﺔ‬ ‫ﺘﻀﻤﻥ‬ ‫ﻓﻘﺩ‬ ‫ﺍﻟﺜﺎﻨﻲ‬ ‫ﺍﻟﻤﺤﻭﺭ‬‫ﻟﻘﻨـﻭﺍﺕ‬
‫ـﻭﻻﺕ‬‫ـ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜ‬ ‫ـل‬‫ـ‬‫ﻤﺜ‬ ‫ـﺸﺒﻜﺔ‬‫ـ‬‫ﺍﻟ‬ ‫ـﻭﻻﺕ‬‫ـ‬‫ﺒﺭﻭﺘﻭﻜ‬ ‫ـﻲ‬‫ـ‬‫ﻓ‬ ‫ـﺔ‬‫ـ‬‫ﺍﻟﻤﺨﻔﻴ‬ ‫ـﻭﺍﺕ‬‫ـ‬‫ﻟﻠﻘﻨ‬ ‫ـﺭﺤﺎ‬‫ـ‬‫ﺸ‬ ‫ـﻡ‬‫ـ‬‫ﺜ‬ ،‫ـﺼﻨﻴﻔﻬﺎ‬‫ـ‬‫ﻭﺘ‬ ‫ـﺔ‬‫ـ‬‫ﺍﻟﻤﺨﻔﻴ‬
IP،TCP،UDP،ICMP.
‫ﻷﻱ‬ ‫ﻴﻤﻜـﻥ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﻓﻔﻲ‬ ،‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺜﻭﻗﻴﺔ‬ ‫ﺘﺄﻜﻴﺩ‬ ‫ﻓﻲ‬ ‫ﺍﺨﺘﻼﻓﻬﻤﺎ‬ ‫ﻤﻊ‬ ‫ﻴﺴﺘﺨﺩﻤﺎﻥ‬ ‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻋﻠﻤﻲ‬ ‫ﺇﻥ‬
،‫ﻤﺸﻔﺭﺓ‬ ‫ﺒﻁﺭﻴﻘﺔ‬ ‫ﻴﺘﺼﻼﻥ‬ ‫ﻁﺭﻓﻴﻥ‬ ‫ﺜﻤﺔ‬ ‫ﺇﻥ‬ ‫ﻴﻜﺘﺸﻑ‬ ‫ﺃﻥ‬ ‫ﻁﺭﻑ‬‫ﺃﻤﺎ‬‫ﺇﺨﻔﺎ‬ ‫ﻓﻲ‬‫ﺍﻻﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬ ‫ﺃﺼﻼ‬ ‫ﻓﻴﺨﻔﻰ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺀ‬
‫ﺍﻻﺘﺼﺎل‬ ‫ﻗﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻴﺘﺒﺎﺩﻻﻥ‬ ‫ﻁﺭﻓﻴﻥ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻴﻼﺤﻅ‬ ‫ﺃﻥ‬ ‫ﻷﺤﺩ‬ ‫ﻴﻤﻜﻥ‬ ‫ﻓﻼ‬.‫ﺇﺨﻔـﺎﺀ‬ ‫ﺒﻴﻥ‬ ‫ﻋﺩﻴﺩﺓ‬ ‫ﻓﺭﻭﻗﺎﺕ‬ ‫ﻭﺜﻤﺔ‬
‫ﺍﻟﺠﺩﻭل‬ ‫ﻓﻲ‬ ‫ﻤﻭﻀﺤﺔ‬ ‫ﻭﻫﻲ‬ ‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬)1.([1]
‫ﺠﺩﻭل‬)1(.‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺃﺨﻔﺎﺀ‬ ‫ﺒﻴﻥ‬ ‫ﺍﻟﻔﺭﻕ‬
‫ﺍﻟﻤﻌﻠــﻭﻤﺎﺕ‬ ‫ﺇﺨﻔــﺎﺀ‬‫ﺍﻟﺘﺸــ‬‫ــﻔﻴﺭ‬
‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻭﺠﻭﺩ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﻤل‬‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻤﺤﺘﻭﻴﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﻤل‬
‫ﺍﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻴﺤﺎﻭل‬‫ﺩﻟﻴﻼ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﻴﻜﻭﻥ‬
‫ﻋﻨﺼﺭ‬ ‫ﻫﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﻨﺘﻴﺠﺔ‬_‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺸﻔﺭ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻫﻲ‬ ‫ﻟﻠﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﻨﺘﻴﺠﺔ‬
‫ﻁﺭﺍﺌﻕ‬ ‫ﻫﺩﻑ‬‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺭﺍﻗـﺏ‬ ‫ﻤﻨـﻊ‬ ‫ﺍﻟﻌﺎﻟﻴﺔ‬ ‫ﺍﻷﻤﻨﻴﺔ‬ ‫ﺫﺍﺕ‬
‫ﺍ‬‫ﺃﺼﻼ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻤﻌﺭﻓﺔ‬ ‫ﻤﻥ‬ ‫ﻟﻭﺴﻴﻁ‬
‫ﺍﻟﺤﺼﻭل‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺘﻁﻔل‬ ‫ﻤﻨﻊ‬ ‫ﺍﻟﻘﻭﻴﺔ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﻁﺭﺍﺌﻕ‬ ‫ﻫﺩﻑ‬
‫ﺍﻟﻤﺸﻔﺭ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻭﺍﻀﺢ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻋﻥ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺃﻴﺔ‬ ‫ﻋﻠﻰ‬
‫ﻭﺠﻡ‬‫ﻫ‬ ‫ﺍﻟﺫﻱ‬
‫ﺍﻟﻁﺒﻴﻌـﺔ‬ ‫ﻋﻠـﻰ‬ ‫ﻴﻌﺘﻤـﺩ‬ ‫ﺒل‬ ‫ﻤﺤﺩﺩﺓ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺜﻤﺔ‬ ‫ﻟﻴﺴﺕ‬
‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺸﺭﻴﺔ‬
‫ﻤﻌﺭﻭﻓﺔ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﺘﻤﺩ‬
‫ﻋ‬ ‫ﻟﻜﻥ‬ ،‫ﺒﺼﻤﺔ‬ ‫ﻟﻪ‬ ‫ﻟﻴﺱ‬‫ﻴـﺘﻡ‬ ‫ﺍﻹﺨﻔـﺎﺀ‬ ‫ﻁﺭﻴﻘـﺔ‬ ‫ﻤﻌﺭﻓـﺔ‬ ‫ﻨﺩ‬
‫ﺍﻟ‬ ‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬‫ﺴﺭﻴﺔ‬
‫ﻟﻠﻤﻬﺎﺠﻡ‬ ‫ﺘﺴﻤﺢ‬ ‫ﻀﻌﻑ‬ ‫ﻨﻘﺎﻁ‬ ‫ﺘﺸﻔﻴﺭ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﻟﻜل‬ ‫ﺘﻭﺠﺩ‬
‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﺒﺎﺴﺘﺭﺠﺎﻉ‬
‫ﻟﻠﺤـﺼﻭل‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻤﻊ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺩﻤﺞ‬ ‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻤﻥ‬
‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬‫ﻋﺎﻟﻲ‬‫ﺍﻷﻤﻨﻴﺔ‬
‫ﺘـﺸﻔﻴﺭ‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﺤﺼﻭل‬ ‫ﺘﺸﻔﻴﺭ‬ ‫ﻁﺭﻴﻘﺘﻲ‬ ‫ﺩﻤﺞ‬ ‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻤﻥ‬
‫ﻤﺯﺩﻭﺝ‬
-2‫ﺍ‬ ‫ﺍﻟﺩﺭﺍﺴﺎﺕ‬‫ﻟﺴﺎﺒﻘﺔ‬
‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﺤﺎﻭل‬‫ﺇﻴﺠﺎﺩ‬‫ﺘﻘﻨﻴﺎﺕ‬‫ﺇﺨﻔﺎﺀ‬‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺭﻴﻊ‬ ‫ﺍﻟﺘﻁﻭﺭ‬ ‫ﺘﻭﺍﻜﺏ‬ ‫ﻤﺘﻁﻭﺭﺓ‬‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻤﻨﻬﻡ‬ ،‫ﻭﺍﻟﺸﺒﻜﺎﺕ‬
‫ﻤﻥ‬‫ﺃﻨﺠﺯ‬،‫ﺍﻻﺼﻁﻨﺎﻋﻲ‬ ‫ﺍﻟﺫﻜﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻤﻊ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻟﺭﺒﻁ‬ ‫ﻭﺍﺴﻌﺔ‬ ‫ﻭﺩﺭﺍﺴﺎﺕ‬ ‫ﺒﺤﻭﺜﺎ‬‫ﻭﺁﺨﺭﻭﻥ‬‫ﺃﻨﺠﺯﻭﺍ‬
‫ﻭﺍ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺨﻼل‬ ‫ﻤﻥ‬ ‫ﺍﻟﺤﺎﺴﻭﺏ‬ ‫ﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺭﻱ‬ ‫ﺍﻻﺘﺼﺎل‬‫ﻭﻤﻥ‬ ،‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻐﻁﺎﺓ‬ ‫ﻟﻜﺘﺎﺒﺔ‬
‫ﺍﻟﺒﺤﻭﺙ‬ ‫ﻫﺫﻩ‬:
.1‫ﻋﺎﻡ‬ ‫ﻓﻲ‬1989‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬Wolf‫ﻭ‬Girling‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﺤﺸﻭﺓ‬ ‫ﺤﻘل‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬padding field‫ﻤـﺜﻼ‬ ،
‫ﻤﻥ‬ ‫ﺍﻗل‬ ‫ﻁﻭﻟﻬﺎ‬ ‫ﻴﻜﻭﻥ‬ ‫ﻋﻨﺩﻤﺎ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﺍﻻﻴﺜﺭﻨﺕ‬ ‫ﺘﺤﺸﻭ‬60Bytes،‫ﺇﺫ‬‫ﻴﺘﻡ‬‫ﺇﻀﺎﻓﺔ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﺸﻭﺓ‬
‫ﺍﻻﻨﺘﺭﻨﺕ‬IP‫ﺍﻟﻨﻘل‬ ‫ﻭﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺤﺠﻡ‬ ‫ﻟﻴﺼﺒﺢ‬64Bytes‫ﻟﺤﺯﻤـﺔ‬ ‫ﺒـﻪ‬ ‫ﻤـﺴﻤﻭﺡ‬ ‫ﺤﺠﻡ‬ ‫ﺍﻗل‬ ‫ﻭﻫﻭ‬
‫ﺍﻟﺸﺒﻜﺔ‬.[17]
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٣٧
.2‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2002‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻗﺩﻡ‬Ahsan‫ﻫﻲ‬ ‫ﺍﻻﻭﻟﻰ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﻘﻨﻴﺘﻴﻥ‬ ‫ﺘﻀﻤﻥ‬ ‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬
‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﻭ‬TCP‫ﻭﺍﻟﺜﺎﻨﻴﺔ‬ ،‫ﻫﻲ‬‫ﺇﻋﺎﺩﺓ‬‫ﺒﺎ‬ ‫ﺍﻟـﺸﺒﻜﺔ‬ ‫ﺤـﺯﻡ‬ ‫ﺘﺭﺘﻴـﺏ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬ ‫ﺴـﺘﺨﺩﺍﻡ‬
IPSec.[7]
.3‫ـﺎﻥ‬‫ـ‬‫ﺍﻟﺒﺎﺤﺜ‬ ‫ـﺩﻡ‬‫ـ‬‫ﻗ‬ ‫ـﺴﻪ‬‫ـ‬‫ﻨﻔ‬ ‫ـﺎﻡ‬‫ـ‬‫ﺍﻟﻌ‬ ‫ﻭﻓـﻲ‬Ahsan‫ﻭ‬Kundur‫ـﻡ‬‫ـ‬‫ﺍﻟﻌﻠ‬ ‫ـﺔ‬‫ـ‬‫ﻗﻴﻤ‬ ‫ـﺘﺨﺩﺍﻡ‬‫ـ‬‫ﺍﺴ‬ ‫ـﺎ‬‫ـ‬‫ﻓﻴﻬ‬ ‫ـﺎ‬‫ـ‬‫ﺍﻗﺘﺭﺤ‬ ‫ـﺔ‬‫ـ‬‫ﻁﺭﻴﻘ‬
Don't fragment)DF(‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﻹﺨﻔﺎﺀ‬‫ﺜﻨﺎﺌﻴﺔ‬ ‫ﻗﻴﻡ‬)0(‫ﺃﻭ‬)1(‫ﻓـﻲ‬ ‫ﻓﻘﻁ‬ ‫ﻭﺫﻟﻙ‬
‫ﺍﻟﻌﻅﻤﻰ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻭﺤﺩﺓ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻤﻌﺭﻓﺔ‬ ‫ﺤﺎﻟﺔ‬Maximum Transfer Unit)(MTU،‫ﺍﻟﻤﺴﺘﻠﻡ‬ ‫ﺇﻟﻰ‬ ‫ﻟﻠﻁﺭﻴﻕ‬
‫ﺍﻟﻌﻅﻤﻰ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻭﺤﺩﺓ‬ ‫ﺤﺠﻡ‬ ‫ﻤﻥ‬ ‫ﺍﻗل‬ ‫ﺤﺠﻡ‬ ‫ﺫﺍﺕ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻓﻴﺭﺴل‬.[Kundur,2002]
.4‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻓﻲ‬ ‫ﻭﻗﺩﻡ‬Fisk‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﻁﺭﻴﻘﺔ‬ ‫ﻓﻴﻪ‬ ‫ﺍﻗﺘﺭﺡ‬ ‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﻹﺨﻔـﺎﺀ‬‫ﻤﻘﻁـﻊ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬
‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP)TCP segment(‫ﺍ‬ ‫ﻴﻜﻭﻥ‬ ‫ﻋﻨﺩﻤﺎ‬‫ﻟﻌﻠﻡ‬TCP reset(RST)‫ﻴﻌﻤل‬ ‫ﺍﻟﻌﻠﻡ‬ ‫ﻭﻫﺫﺍ‬ ،‫ﻤﺸﻐﻼ‬
‫ﻭﻻ‬ ،‫ﺍﻻﺘﺼﺎل‬ ‫ﻗﻁﻊ‬ ‫ﻋﻠﻰ‬‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﻘﻁﻊ‬ ‫ﻫﺫﺍ‬ ‫ﻴﺤﺘﻭﻱ‬.[17]
.5‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2004‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻗﺩﻡ‬Lliamas‫ﻭﻜﻴل‬ ‫ﺨﺎﺩﻡ‬ ‫ﻓﻴﻪ‬ ‫ﺼﻤﻡ‬ ‫ﺒﺤﺜﺎ‬Server proxy‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﻘﻨـﺎﺓ‬ ‫ﻓﻲ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬
‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬Identification‫ﺍﻟﺒﺭﻭﺘ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬‫ﻭﻜﻭل‬IP‫ﻤـﻥ‬ ‫ﻤﻌﻴﻨـﺔ‬ ‫ﺨﺩﻤﺔ‬ ‫ﻁﻠﺏ‬ ‫ﻋﻨﺩ‬
‫ﺍﻟﺨﺎﺩﻡ‬.[Lliamas,2004]
.6‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﻗﺩﻡ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻭﻓﻲ‬Cauich‫ﻭ‬Gomez‫ﻭ‬Watanabe‫ﺘﺭﻭﻴـﺴﺔ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤـﺎﺕ‬ ‫ﻹﺨﻔـﺎﺀ‬ ‫ﺒﺤﺜﺎ‬
‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬IP‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﻓﻲ‬Identification‫ﻭﺤﻘل‬‫ﺍﻟﺠﺯﺀ‬ ‫ﺍﻨﺯﻴﺎﺡ‬Fragment Offset‫ﻓـﻲ‬
‫ﻗ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺠﺯﺌﺔ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻭﺠﻭﺩﺓ‬ ‫ﺍﻟﻤﻭﺠﻬﺎﺕ‬ ‫ﺒل‬.[Cauich,2004]
.7‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2005‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬Bharti‫ﻭ‬Snigdh‫ﺒﺤﺜﺎ‬‫ﻹﺨﻔﺎﺀ‬‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬IP‫ﻭ‬TCP‫ﻭﺍﻗﺘﺭﺤﺎ‬
‫ﺃﻓﻀل‬‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻫﺫﻩ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ ‫ﺤﻘﻭل‬‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺯﺩﺤﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬.[8]
.8‫ﻨﻔ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻭﻓﻲ‬‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬ ‫ﺴﻪ‬Murdoch‫ﻭ‬Lwies‫ﺍﻟﺘﻌﺭﻴـﻑ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﻭﺍﺕ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺒﺤﺜﺎ‬
Identification‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﺍﻟﺘﺴﻠـﺴﻠﻲ‬ ‫ﺍﻟﺭﻗﻡ‬ ‫ﻭﺤﻘل‬ ،Sequence Number‫ﻓـﻲ‬
‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺘﺸﻐﻴل‬ ‫ﻨﻅﺎﻡ‬ ‫ﺒﻴﺌﺔ‬ ‫ﻓﻲ‬Linux.[13]
.9‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2006‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﻗﺩﻡ‬Zander‫ﻭ‬Armitage‫ﻭ‬Branch‫ﺒﺤﺜﺎ‬‫ﻹﺨﻔـﺎﺀ‬‫ﻤـﺩﺓ‬ ‫ﺤﻘـل‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬
‫ﺍﻟﺤﻴﺎﺓ‬Time To Live(TTL)‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP.[17]
-3‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬
‫ﺒـﻴﻥ‬ ‫ﻭﺍﻟﺘﻔﺎﻋـل‬ ‫ﺍﻻﺘـﺼﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻭﺘﻨﻅﻡ‬ ‫ﺘﺘﺤﻜﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﻭﺍﻹﺠﺭﺍﺀﺍﺕ‬ ‫ﺍﻟﻘﻭﺍﻨﻴﻥ‬ ‫ﻤﻥ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬
‫ﺘﺴﺘﻁ‬ ‫ﻟﻜﻲ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﺨﺘﻠﻔﺔ‬ ‫ﺍﻷﺠﻬﺯﺓ‬‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻭﻤﻥ‬ ،‫ﺍﻵﺨﺭ‬ ‫ﻤﻨﻬﺎ‬ ‫ﻜل‬ ‫ﻭﻓﻬﻡ‬ ‫ﺒﻌﻀﻬﺎ‬ ‫ﻤﻊ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺍﻷﺠﻬﺯﺓ‬ ‫ﻫﺫﻩ‬ ‫ﻴﻊ‬
‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻜﺩﺱ‬ ‫ﻋﻨﺩﺌﺫ‬ ‫ﻭﺘﺴﻤﻰ‬ ،‫ﻤﻌﻴﻥ‬ ‫ﺃﻤﺭ‬ ‫ﻟﺘﻨﻔﻴﺫ‬ ‫ﺒﻌﻀﻬﺎ‬ ‫ﻤﻊ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻋﺩﺓ‬ ‫ﺘﻌﻤل‬ ‫ﺃﻥ‬Protocol Stack،
‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﺃﻭ‬Protocol Suite.[5]
‫ﻫﻲ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﺍﻟﺠﻬﺎﺯ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻭﻅﻴﻔﺔ‬ ‫ﺇﻥ‬:
.1‫ﺍﻟﺒ‬ ‫ﺘﻘﺴﻴﻡ‬‫ﻤﻘﺎﻁﻊ‬ ‫ﺇﻟﻰ‬ ‫ﻴﺎﻨﺎﺕ‬.
.2‫ﺍﻟﺤﺯﻡ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﻌﻨﻭﻨﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﻀﺎﻓﺔ‬.
.3‫ﻟﻺﺭﺴﺎل‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﺠﻬﻴﺯ‬.
‫ﻓﻬﻲ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺍﻟﺠﻬﺎﺯ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻭﻅﻴﻔﺔ‬ ‫ﺃﻤﺎ‬:
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٣٨
.1‫ﺍﻻﺘﺼﺎل‬ ‫ﻭﺴﻁ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﺍﻟﺘﻘﺎﻁ‬.
.2‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺎﺯ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﺇﺩﺨﺎل‬.
.3‫ﻭﻗﺭﺍ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻜل‬ ‫ﺘﺠﻤﻴﻊ‬‫ﺍﻟﺤﺯﻡ‬ ‫ﻫﺫﻩ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﻤﻀﺎﻓﺔ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺀﺓ‬.
.4‫ﺘﺠﻤﻴﻌﻬﺎ‬ ‫ﻹﻋﺎﺩﺓ‬ ‫ﻤﺅﻗﺘﺔ‬ ‫ﺫﺍﻜﺭﺓ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺤﺯﻡ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻨﺴﺦ‬.
.5‫ﻟﻼﺴﺘﺨﺩﺍﻡ‬ ‫ﻗﺎﺒﻠﺔ‬ ‫ﻤﻔﻬﻭﻤﺔ‬ ‫ﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﺍﻤﺞ‬ ‫ﺇﻟﻰ‬ ‫ﺘﺠﻤﻴﻌﻬﺎ‬ ‫ﺍﻟﻤﻌﺎﺩ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻤﺭﻴﺭ‬.
1-3‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﺠﻤﻭﻋﺔ‬TCP/IP
‫ﻷﻫ‬ ‫ﹰ‬‫ﺎ‬‫ﻁﺒﻘ‬ ‫ﺘﺴﻤﻴﺘﻬﺎ‬ ‫ﺘﻤﺕ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﻫﻲ‬‫ﻭﻫﻤـﺎ‬ ‫ﺍﻟﻤﺠﻤﻭﻋـﺔ‬ ‫ﻓﻲ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻟﻴﻥ‬ ‫ﻡ‬IP
‫ﻭ‬TCP.‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺍﺤﺩ‬ ‫ﻤﻊ‬ ‫ﻴﺘﻌﺎﻤل‬ ‫ﺃﻥ‬ ‫ﻤﺴﺘﺨﺩﻡ‬ ‫ﻷﻱ‬ ‫ﻴﻤﻜﻥ‬ ‫ﻭﻻ‬TCP/IP،‫ﺍﻷﺨﺭﻯ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻋﻥ‬ ‫ﺒﻤﻌﺯل‬
‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻻﻥ‬ ‫ﻭﺫﻟﻙ‬TCP/IP‫ﻁﺒﻘﺔ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺒﻨﻘل‬ ‫ﺘﻘﻭﻡ‬‫ﺇﻟﻰ‬‫ﺍﻟﻨﻘل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻻﻨﺠﺎﺯ‬ ‫ﹰ‬‫ﺎ‬‫ﺴﻭﻴ‬ ‫ﻭﺘﺘﻌﺎﻤل‬ ‫ﺃﺨﺭﻯ‬.[3]
‫ﺃ‬-‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬IP
‫ﺒﺭﻭ‬ ‫ﻴﻌﺩ‬‫ﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﻤﻜﺩﺱ‬ ‫ﻓﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﻁﺒﻘﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺭﺌﻴﺱ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺘﻭﻜﻭل‬TCP/IP.
‫ﺍﻟﻤﻨﻁﻘﻲ‬ ‫ﺍﻟﻌﻨﻭﺍﻥ‬ ‫ﺘﺤﺩﻴﺩ‬ ‫ﻋﻥ‬ ‫ﻤﺴﺅﻭل‬ ‫ﻭﻫﻭ‬IP address‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺨﻼل‬ ‫ﺘﻨﻘل‬ ‫ﺤﺯﻤﺔ‬ ‫ﻜل‬ ‫ﻭﻭﺠﻬﺔ‬ ‫ﻟﻤﺼﺩﺭ‬.[5]‫ﻭﻴﻤﺜل‬
‫ﺍﻟﺸﻜل‬)1(‫ﺍﻨﺘﺭﻨﻴﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP
‫ﺍﻟﺸﻜل‬)1(.‫ﺒ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺭﻭﺘﻭﻜﻭل‬IP
‫ﺏ‬-‫ﺒﺎﻹﺭﺴﺎل‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP
‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﻴﻬﺩﻑ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻫﻭ‬‫ﺇﻟﻰ‬‫ﻋﺎﻟﻴـﺔ‬ ‫ﺒﻤﻭﺜﻭﻗﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻨﻘل‬ ‫ﺨﺩﻤﺔ‬ ‫ﺘﻭﻓﻴﺭ‬
‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺒﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﹰ‬‫ﺎ‬‫ﺩﻭﻤ‬ ‫ﻴﺭﺘﺒﻁ‬ ‫ﻭﻫﻭ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﻤﺘﺼﻠﻴﻥ‬ ‫ﺤﺎﺴﺒﻴﻥ‬ ‫ﺒﻴﻥ‬‫ﺘﻁﺒﻴﻘـﺎﺕ‬ ‫ﻗﺒـل‬ ‫ﻤﻥ‬ ‫ﻭﻴﺴﺘﺨﺩﻡ‬ ،
‫ﺍﺘ‬ ‫ﺘﺘﻁﻠﺏ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻀﻴﺎﻉ‬ ‫ﻋﺩﻡ‬ ‫ﻭﻴﻀﻤﻥ‬ ‫ﹰ‬‫ﺎ‬‫ﻭﻤﻭﺜﻭﻗ‬ ‫ﹰ‬‫ﺎ‬‫ﺁﻤﻨ‬ ‫ﺼﺎﻻ‬[3].‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺘﺤﺘﻭﻱ‬TCP‫ﻋﻠـﻰ‬
‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻟﻤﻭﺜﻭﻕ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺘﻀﻤﻥ‬ ‫ﺤﻘﻭل‬)2.(
‫ﺍﻟﺸﻜل‬)2(.‫ﺘﺭﻭﻴﺴﺔ‬TCP
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٣٩
‫ﺝ‬-‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﻤﻌﻁﻴﺎﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬UDP
‫ﹰ‬‫ﻻ‬‫ﺍﺘﺼﺎ‬ ‫ﻴﺅﻤﻥ‬ ‫ﻻ‬ ‫ﻭﻫﻭ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻫﻭ‬‫ﹰ‬‫ﺎ‬‫ﻤﻭﺜﻭﻗ‬‫ﻻ‬ ‫ﺍﻱ‬ ،‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬ ‫ﻭﺼـﻭل‬ ‫ﻴﻀﻤﻥ‬‫ﺇﻟـﻰ‬
‫ﻜﺎﻤﻠﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬،‫ﻋﻤﻠﻴـﺔ‬ ‫ﻓﻲ‬ ‫ﻋﺎﻟﻴﺔ‬ ‫ﺴﺭﻋﺔ‬ ‫ﻭﺘﺘﻁﻠﺏ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻤﻥ‬ ‫ﻜﺒﻴﺭﺓ‬ ‫ﻜﻤﻴﺎﺕ‬ ‫ﺘﺭﺴل‬ ‫ﺘﻁﺒﻴﻘﺎﺕ‬ ‫ﻓﻲ‬ ‫ﻭﻴﺴﺘﺨﺩﻡ‬
‫ﺍﻟﻨﻘل‬.‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬)3.([2]
‫ﺍﻟﺸﻜل‬)3(.‫ﺘﺭﻭﻴﺴﺔ‬UDP
‫ﺩ‬-‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ICMP
‫ﻴﻌﺩ‬ICMP‫ﻟﺘ‬ ‫ﺃﺴﺎﺴﻲ‬ ‫ﺒﺸﻜل‬ ‫ﻴﺴﺘﺨﺩﻡ‬ ‫ﹰ‬‫ﻻ‬‫ﺒﺭﻭﺘﻭﻜﻭ‬‫ﺒـﻴﻥ‬ ‫ﺘﺤـﺩﺙ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻤﺸﺎﻜل‬ ‫ﺸﺨﻴﺹ‬‫ﺃﺠﻬـﺯﺓ‬‫ﺍﻟـﺸﺒﻜﺔ‬
]،‫ﺍﺩﺭﻴﺱ‬٢٠٠٦[.‫ﺭﺴﺎﻟﺔ‬ ‫ﻤﻥ‬ ‫ﻤﺘﻐﻴﺭﺓ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﻘﻭل‬‫ﺇﻟﻰ‬‫ﺃﺨﺭﻯ‬‫ﻓـﻲ‬ ‫ﺘﺘـﺸﺎﺒﻪ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﺠﻤﻴﻊ‬ ‫ﻭﻟﻜﻥ‬
‫ﺍﻟﺜﻼﺜﺔ‬ ‫ﺍﻟﺤﻘﻭل‬‫ﺍﻷﻭﻟﻰ‬‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬)4.([10]
‫ﺍﻟﺸﻜل‬)4(.‫ﺘﺭﻭﻴﺴﺔ‬ICMP
-4‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬Covert Channels
‫ﻭﻫﻲ‬‫ﻟ‬ ‫ﺍﺘﺼﺎل‬ ‫ﻤﺴﺎﺭﺍﺕ‬‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻨﻘل‬ ‫ﻏﺎﻴﺘﻬﺎ‬ ‫ﺘﻜﻥ‬ ‫ﻟﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ،‫ﺘﺼﻤﻴﻤﻬﺎ‬ ‫ﻴﺘﻡ‬ ‫ﻡ‬‫ﺃﺒﺩﺍ‬‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻫﺫﻩ‬ ‫ﻭﺘﺴﺘﺨﺩﻡ‬ ،
‫ﺨﺩﻤـﺔ‬ ‫ﺘﻨﺠـﺯ‬ ‫ﺫﺍﺘﻪ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﻓﻲ‬ ‫ﻭﻫﻲ‬ ‫ﻟﺼﺎﻟﺤﻬﺎ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﺤﺼﻭل‬ ‫ﺃﺠل‬ ‫ﻤﻥ‬ ‫ﺒﻬﺎ‬ ‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺒﺭﺍﻤﺞ‬ ‫ﻗﺒل‬ ‫ﻤﻥ‬
‫ﺃﺨﺭﻯ‬ ‫ﻟﺒﺭﺍﻤﺞ‬.[12]
1-4‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻨﻴﻑ‬
‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻟﻠﻘﻨﻭﺍﺕ‬ ‫ﺭﺌﻴﺴﻴﻥ‬ ‫ﺼﻨﻔﻴﻥ‬ ‫ﺒﻴﻥ‬ ‫ﺍﻟﺘﻤﻴﻴﺯ‬ ‫ﻴﻤﻜﻥ‬‫ﻭﻫﻤﺎ‬:[14]
-1‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺨﺯﻥ‬ ‫ﻗﻨﺎﺓ‬Covert Storage Channel
‫ﻤﻌﻠﻭﻤـﺎﺕ‬ ‫ﻭﻗﺭﺍﺀﺓ‬ ‫ﺨﺯﻨﻲ‬ ‫ﻤﻭﻗﻊ‬ ‫ﻓﻲ‬ ‫ﻤﺒﺎﺸﺭﺓ‬ ‫ﻭﻏﻴﺭ‬ ‫ﻤﺒﺎﺸﺭﺓ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻥ‬‫ﻤ‬‫ﹸﻀ‬‫ﺘ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻫﻲ‬
‫ﺍﻻﺴﺘﺭﺠﺎﻉ‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻭﻗﻊ‬ ‫ﺫﻟﻙ‬.‫ﺇﺭﺴـﺎل‬ ‫ﻴﺘﻁﻠـﺏ‬ ‫ﻤـﺜﻼ‬ ،‫ﺍﻟﻨﻅﺎﻡ‬ ‫ﻓﻲ‬ ‫ﻤﺸﺘﺭﻜﺔ‬ ‫ﻤﺼﺎﺩﺭ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻴﺘﻁﻠﺏ‬ ‫ﻭﻫﺫﺍ‬
‫ﺍﻟﺤﺭﻓﻴﻥ‬"AB"‫ﺒﺎﺴﺘﺨﺩﺍ‬‫ﺸﻔﺭﺓ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺘﻀﻤﻴﻥ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﺨﺯﻥ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻡ‬Unicode‫ﺍﻟـﺭﻗﻡ‬ ‫ﺤﻘـل‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺤﺭﻓﻴﻥ‬ ‫ﻟﻬﺫﻴﻥ‬
‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺘﺴﻠﺴﻠﻲ‬TCP‫ﺍﻟﺤـﺭﻓﻴﻥ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﻴﺘﻡ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﺍﻟﻤﺭﺴل‬ ‫ﻁﺭﻑ‬ ‫ﻓﻲ‬
"AB"‫ﻋﻤﻠﻴﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﻓﻴﻪ‬ ‫ﺨﺯﻨﺕ‬ ‫ﺍﻟﺫﻱ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻤﻜﺎﻥ‬ ‫ﻤﻥ‬‫ﺍﻹﺭﺴﺎل‬‫ﻭﺍﻟﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺘﻤﺜل‬ ‫ﺍﻟﺴﺭﻱ‬
‫ﺍﻟﻤﺼ‬‫ﺍﻟﻤﺸﺘﺭﻙ‬ ‫ﺩﺭ‬.[11] [8]
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٤٠
-2‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﻗﻨﺎﺓ‬Covert Timing Channel
‫ﺯﻤﻨﻴﺔ‬ ‫ﻓﺘﺭﺍﺕ‬ ‫ﺒﺘﻀﻤﻴﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺘﻀﻤﻴﻥ‬ ‫ﻴﺘﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻫﻲ‬)‫ﺘﺄﺨﻴﺭﺍﺕ‬(‫ﺍﻹﺤـﺩﺍﺙ‬ ‫ﻭﻗﻭﻉ‬ ‫ﻋﻠﻰ‬
‫ﺜﻨﺎﺌﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﻨﻔﻴﺫ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﻭﺼﻭل‬ ‫ﺃﺯﻤﻨﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺜﻼ‬ ،‫ﺍﻟﻨﻅﺎﻡ‬ ‫ﻓﻲ‬)Binary channel.([9]
2-4‫ﻤﻭﺍﺼﻔﺎﺕ‬‫ﺍﻟﻨﺎﺠﺤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬
‫ﻭﻫﻲ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻋﻨﺩ‬ ‫ﻟﻬﺎ‬ ‫ﺍﻟﺘﻨﺒﻪ‬ ‫ﻴﺸﺘﺭﻁ‬ ‫ﻤﻭﺍﺼﻔﺎﺕ‬ ‫ﺜﻤﺔ‬:
.1‫ﻴﺸﺘﺭﻁ‬‫ﺃﻥ‬‫ﻭﻤﺘﻨﺎﺴﻘﺔ‬ ‫ﻨﻅﺎﻤﻴﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻀﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺘﺒﺩﻭ‬.
.2‫ﹰ‬‫ﺍ‬‫ﻭﺸﺎﺫ‬ ‫ﻁﺒﻴﻌﻲ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻤﺭﻭﺭ‬ ‫ﻴﺠﻌل‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻨﺎﺴﺒﺔ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺤﻘﻭل‬ ‫ﺍﺨﺘﻴﺎﺭ‬.
.3‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺨﺘﻴﺎﺭ‬‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻟﻠﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺍﻻﺨﺘﺒﺎﺀ‬ ‫ﻭﻗﺩﺭﺓ‬ ‫ﺴﺭﻴﺔ‬ ‫ﻤﻥ‬ ‫ﻴﺯﻴﺩ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﻴﺌﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺸﺎﺌﻊ‬.
3-4‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬
‫ﺃ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻲ‬IP
‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬:[17] [16] [7]
.1‫ﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬IPIP Identification
.2‫ﺍﻟﺤﻴﺎﺓ‬ ‫ﻤﺩﺓ‬ ‫ﺤﻘل‬Time To Live
.3‫ﺍﻟﺨﻴﺎﺭﺍﺕ‬ ‫ﺤﻘل‬IP Option
‫ﺏ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬TCP
‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬:[16] [15] [13]
١.‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻤﻨﻔﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬Source Port number
٢.‫ﺍﻟﺘﺴﻠﺴل‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬TCP sequence number
٣.‫ﺍﻹﺸﻌﺎﺭ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬Acknowledgment number
٤.‫ﺤﻘل‬‫ﺍﻟ‬ ‫ﻤﺅﺸﺭ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺤﺎﻟﺔ‬Urgent Pointer
‫ﺝ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻲ‬ICMP
‫ﺭﺴﺎﺌل‬ ‫ﻤﻥ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﻜل‬ ‫ﺃﻥ‬ICMP‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻋﻥ‬ ‫ﺘﺨﺘﻠﻑ‬ ‫ﺨﺎﺼﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﻟﻬﺎ‬،‫ﺍﻷﺨﺭﻯ‬‫ﺍﻟﺤـﺎﻻﺕ‬ ‫ﺒﻌـﺽ‬ ‫ﻭﻓﻲ‬
‫ﻤﻥ‬ ‫ﺭﺴﺎﺌل‬ ‫ﺘﺘﻭﻟﺩ‬ICMP‫ﺤﻘﻭ‬ ‫ﻋﻠﻰ‬ ‫ﺘﺤﺘﻭﻱ‬‫ﺃﺸﻬﺭ‬ ‫ﻭﻤﻥ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﻤﻨﻬﺎ‬ ‫ﻴﺴﺘﻔﺎﺩ‬ ‫ﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﻏﻴﺭ‬ ‫ل‬
‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻫﺫﻩ‬:[16] [10]
.1‫ﺇﻟﻴﻬﺎ‬ ‫ﺍﻟﻭﺼﻭل‬ ‫ﻴﻤﻜﻥ‬ ‫ﻻ‬ ‫ﺍﻟﻭﺠﻬﺔ‬Destination Unreachable
‫ﺍﻟﺸﻜل‬)5(.‫ﺇﻟﻴﻬﺎ‬ ‫ﺍﻟﻭﺼﻭل‬ ‫ﻻﻴﻤﻜﻥ‬ ‫ﺍﻟﻭﺠﻬﺔ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٤١
.2‫ﺘﺠﺎﻭﺯ‬‫ﺍﻟﻭﻗﺕ‬Time Exceeded
‫ﺍﻟﺸﻜل‬)6(.‫ﺍﻟﻭﻗﺕ‬ ‫ﺘﺠﺎﻭﺯ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬
.3‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬Echo Request
‫ﺍﻟﺸﻜل‬)7(.‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬
-5‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻘﺘﺭﺡ‬ ‫ﺍﻟﻨﻅﺎﻡ‬
‫ﺍﻗﺘﺭﺍﺡ‬ ‫ﺘﻡ‬‫ﺴﺭﻴﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﻨﻅﺎﻡ‬)‫ﻤﺸﻔﺭﺓ‬(‫ﺤﻴـﺙ‬ ،‫ﺍﻻﺘـﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﻭﺇﺭﺴﺎﻟﻬﺎ‬
‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬IP‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬Identification‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ،
‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﻤ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬‫ﺅ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺍﻟﺤﺎﻟﺔ‬ ‫ﺸﺭ‬Urgent Pointer‫ﻭﺒﺭﻭﺘﻭﻜـﻭل‬ ،
UDP‫ﻤ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻨﻔﺫ‬Source Port‫ﺍﻟﺒﺭﺘﻭﻜﻭل‬ ‫ﻭﺃﺨﻴﺭﺍ‬ ،ICMP‫ﻁﻠـﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬
‫ﺍﻟﺼﺩﻯ‬Echo Request‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺤﻘل‬Message.‫ﻭﺍﻟﺸﻜل‬)8(‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻟﻺﺨﻔـﺎﺀ‬ ‫ﺍﻟﺼﻨﺩﻭﻗﻲ‬ ‫ﺍﻟﻤﺨﻁﻁ‬ ‫ﻴﺒﻴﻥ‬
‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.‫ﺍﻟﺘـﺸﻔﻴﺭ‬ ‫ﻤﺭﺤﻠـﺔ‬ ‫ﻤـﻥ‬ ‫ﺍﻟﻨﺎﺘﺠﺔ‬ ‫ﺍﻟﻤﺸﻔﺭﺓ‬ ‫ﺍﻟﻨﺼﻴﺔ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺒﺈﺨﻔﺎﺀ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﺠﻬﺔ‬ ‫ﺘﻘﻭﻡ‬ ‫ﺤﻴﺙ‬‫ﺃ‬‫ﻭ‬
‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺤﻠﻴـﺔ‬ ‫ﺸـﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻤﺭﺤﻠﺔ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻨﺎﺘﺠﺔ‬ ‫ﺍﻟﻤﻠﻭﻨﺔ‬ ‫ﺍﻟﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬
‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.[6]
‫ﹰ‬‫ﺎ‬‫ﻨـﺼ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻠﻙ‬ ‫ﺃﻜﺎﻨﺕ‬ ‫ﺴﻭﺍﺀ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﻴﺘﻡ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺔ‬ ‫ﻭﻓﻲ‬
‫ﻤﺸﻔﺭ‬ ‫ﻨﺹ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻴﺔ‬‫ﻤ‬ ‫ﺼﻭﺭﺓ‬ ‫ﺃﻡ‬ ‫ﹰ‬‫ﺍ‬‫ﻤﺸﻔﺭ‬.
1-5‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬
‫ﺃ‬-‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﺘﺼﻤﻴﻡ‬
‫ﻫﻲ‬ ‫ﺸﺒﻜﺎﺕ‬ ‫ﺜﻼﺙ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺘﺘﻜﻭﻥ‬10.10.0.0‫ﻭ‬150.150.0.0‫ﻭ‬192.168.0.0،‫ﻭﺘﺤﺘﻭﻱ‬
،‫ﻤﻭﺠﻪ‬ ‫ﻭﺠﻬﺎﺯﻱ‬ ‫ﺤﺎﺴﻭﺏ‬ ‫ﺠﻬﺎﺯﻱ‬ ‫ﻋﻠﻰ‬‫ﻭ‬‫ﺸـﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺘﻲ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺤﺘﻭﻱ‬ ‫ﺤﺎﺴﻭﺏ‬ ‫ﺠﻬﺎﺯ‬ ‫ﻫﻭ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﻤﻭﺠﻪ‬ ‫ﺠﻬﺎﺯ‬
‫ﺒ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺎﻜﻥ‬ ‫ﺍﻟﺘﻭﺠﻴﻪ‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﻭﻗﺩ‬‫ﻤﻭﺠﻪ‬ ‫ﻟﻜل‬ ‫ﺍﻟﺘﻭﺠﻴﻪ‬ ‫ﺠﺩﻭل‬ ‫ﻨﺎﺀ‬،‫ﺍﻟﺸﻜل‬ ‫ﻭﻴﺒﻴﻥ‬)10-4(‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺘﺼﻤﻴﻡ‬
‫ﺒﺭﻨﺎﻤﺞ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Packet Tracer‫ﺭﺒﻁﻬﺎ‬ ‫ﻗﺒل‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻭﻓﺤﺹ‬ ‫ﻟﺭﺴﻡ‬ ‫ﺍﻟﺒﺭﻨﺎﻤﺞ‬ ‫ﻫﺫﺍ‬ ‫ﻭﺍﺴﺘﺨﺩﻡ‬
‫ﻓﻴﺯﻴﺎﺌﻴﺎ‬.
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٤٢
‫ﺍﻟﺸﻜل‬)10-4(.‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬
‫ﺏ‬-‫ﺍﻹ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺨﻔﺎﺀ‬
‫ﺍﻟﻤﺩﺨﻼﺕ‬:‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬)Network Packets(‫ﻤﺨﻔﻴﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺇﺭﺴﺎﻟﻪ‬ ‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻟﻤﻠﻑ‬ ،.
‫ﺍﻟﻤﺨﺭﺠﺎﺕ‬:‫ﺴﺭﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻰ‬‫ﻤ‬‫ﺍﻟ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬.
‫ﺍﻟﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺨﻁﻭﺍﺕ‬:
-1‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺇﺭﺴﺎﻟﻪ‬ ‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﺍﺴﻡ‬ ‫ﺇﺩﺨﺎل‬.
-2‫ﺤﺴﺎ‬‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺏ‬.
-3‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﺘﻭﻟﻴﺩ‬.
-4‫ﺇﺭﺴﺎل‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺘﻜﻭﻥ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬.
-5‫ﺤﻘل‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺤﺸﺭ‬ID‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP.
-6‫ﺍﻟﺤﻘل‬ ‫ﻗﻴﻤﺔ‬ ‫ﺘﻐﻴﻴﺭ‬TOS‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP.
-7‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺤﺴﺎﺏ‬IPCHECKSUM‫ﻟﺘﺭﻭﻴﺴﺔ‬IP.
-8‫ﺍﻟﺘﻐﻴﻴﺭ‬ ‫ﺒﻌﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺇﻟﻰ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺔ‬.
-9‫ﺇﺭﺴﺎل‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺘﻜﻭﻥ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬
-10‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻤﻥ‬ ‫ﺜﻤﺎﻨﻴﺘﻴﻥ‬ ‫ﻜﺘﻠﺘﻴﻥ‬ ‫ﻗﺭﺍﺀﺓ‬IP, TCP, UDP‫ﻭ‬32‫ﻓﻲ‬ ‫ﺜﻤﺎﻨﻴﺔ‬ ‫ﻜﺘﻠﺔ‬
‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺤﺎﻟﺔ‬ICMP.
-11‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺤﺴﺎﺏ‬IPCHECKSUM‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬.
-12‫ﺍﻟﺸ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺍﻟﺘﻐﻴﻴﺭ‬ ‫ﺒﻌﺩ‬ ‫ﺒﻜﺔ‬‫ﺇﻟﻰ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺔ‬.
-13‫ﺍﺭﺠﻊ‬‫ﺇﻟﻰ‬9‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﻨﺘﻬﺎﺀ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬.
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٤٣
-14‫ﺇﻨﻬﺎﺀ‬‫ﺍﻻﺘﺼﺎل‬.
-15‫ﺍﻟﻨﻬﺎﻴﺔ‬.
‫ﺝ‬-‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬
‫ﺍﻟﻤﺩﺨﻼﺕ‬:‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬)Network Packets(‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺃﻱ‬ ‫ﺍﻟﻤﺴﺘﻘﺒﻠﺔ‬.
‫ﺍﻟﻤﺨﺭﺠ‬‫ﺎﺕ‬:‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺴﺘﺭﺠﻌﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬.
‫ﺍﻟﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺨﻁﻭﺍﺕ‬:
.1‫ﻤﻠﻑ‬ ‫ﺍﺴﻡ‬ ‫ﺇﺩﺨﺎل‬‫ﺍﻹﺨﺭﺍﺝ‬.
.2‫ﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬.
.3‫ﺤﻘل‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ID‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP.
.4‫ﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬IP.
.5‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬, ICMPIP, TCP, UDP‫ﻭ‬٣٢.
.6‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺭﺠﻌﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺨﺯﻥ‬‫ﺍﻹﺨﺭﺍﺝ‬.
.7‫ﺍﻻﺴﺘﺭﺠﺎﻉ‬ ‫ﺒﻌﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺇﻟﻰ‬‫ﺍﻟﺘﺸﻐﻴل‬ ‫ﻨﻅﺎﻡ‬.
.8‫ﺍﺭﺠﻊ‬‫ﺇﻟﻰ‬4‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﻨﺘﻬﺎﺀ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬.
.9‫ﺇﻨﻬﺎﺀ‬‫ﺍﻻﺘﺼﺎل‬.
.10‫ﺍﻟﻨﻬﺎﻴﺔ‬.
2-5‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬
‫ﻜﻠﻤﺔ‬ ‫ﺇﺭﺴﺎل‬ ‫ﺘﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻤﺠﺎل‬ ‫ﻓﻲ‬al_mosul‫ﺍﻟﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴـﺔ‬ ‫ﺒﺼﻭﺭﺓ‬IP
‫ﻭ‬TCP‫ﻭ‬UDP‫ﻜﻠﻤﺔ‬ ‫ﻭﺇﺭﺴﺎل‬ ،al_mosul‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺘﺸﻔﻴﺭﻫﺎ‬ ‫ﺒﻌﺩ‬IP،‫ﺒﺤﺠـﻡ‬ ‫ﻤﻠﻑ‬ ‫ﺇﺭﺴﺎل‬ ‫ﻭﻜﺫﻟﻙ‬
256‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ICMP‫ﺒﺭﻨﺎﻤﺞ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺠﻠﺕ‬‫ﺴ‬‫ﻭ‬ ،Ethereal‫ﺒﺭﻨـﺎﻤﺞ‬ ‫ﻭﻫـﻭ‬
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺤﻠﻴل‬.
-1‫ﺍﻹ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺨﻔﺎﺀ‬‫ﺍﻻﻨﺘﺭﻨﺕ‬IP
‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬
Identification‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP
‫ﺍﻟﺸﻜل‬)10(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٤٤
‫ﺍﻟﺸﻜل‬)11(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﻓﻴﻬ‬ ‫ﻤﺨﻔﻰ‬‫ﺍﻟﺤﺭﻓ‬ ‫ﺎ‬‫ﺎﻥ‬al
‫ﺍﻟﺸﻜل‬)12(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬_m
‫ﺍﻟﺸﻜل‬)13(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬os
‫ﺍﻟﺸﻜل‬)14(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬ul
-2‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻨﻘل‬TCP
‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﺍﻟﻘﻨﺎ‬ ‫ﻋﺒﺭ‬‫ﻤﺅﺸـﺭ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺓ‬
‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺍﻟﺤﺎﻟﺔ‬urgent pointer‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬TCP‫ﻓـﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ،
‫ﺍﻷﺸﻜﺎل‬:
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٤٥
‫ﺍﻟﺸﻜل‬)15(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬al
‫ﺍﻟﺸﻜل‬)16(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬_m
‫ﺍﻟﺸﻜل‬)17(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬os
‫ﺍﻟﺸﻜل‬)18(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬ul
-3‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻨﻘل‬UDP
‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﻤﻨﻔـﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬
‫ﺍﻟﻤﺼﺩﺭ‬source port‫ﺒﺭﻭ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬‫ﺍﻷﺸﻜﺎل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ،‫ﺍﻟﻨﻘل‬ ‫ﺘﻭﻜﻭل‬:
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٤٦
‫ﺍﻟﺸﻜل‬)19(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬al
‫ﺍﻟﺸﻜل‬)20(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓﻴﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬_m
‫ﺍﻟﺸﻜل‬)21(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬os
‫ﺍﻟﺸﻜل‬)22(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﻤ‬‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬ul
-4‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ICMP
‫ﺤﺠﻤﻪ‬ ‫ﻤﻠﻑ‬ ‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬ ‫ﺜﻤﺎﻥ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬256‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬
message‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ICMP‫ﺍﻷﺸﻜﺎل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ،:
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٤٧
‫ﺍﻟﺸﻜل‬)23(.‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺍﻷ‬‫ﻭﻟﻰ‬‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ICMP
‫ﺍﻟﺸﻜل‬)24(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻨﻴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
‫ﺍﻟﺸﻜل‬)25(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻟﺜﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
‫ﺍﻟﺸﻜل‬)26(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺭﺍﺒﻌﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
‫ﺍﻟﺸﻜل‬)27(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺨﺎﻤﺴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٤٨
‫ﺍﻟﺸﻜل‬)28(.‫ﻟﺒ‬ ‫ﺍﻟﺴﺎﺩﺴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺭﻭﺘﻭﻜﻭل‬ICMP
‫ﺍﻟﺸﻜل‬)29(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺴﺎﺒﻌﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
‫ﺍﻟﺸﻜل‬)30(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻤﻨﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
-6‫ﺍﻻﺴﺘﻨﺘﺎﺠﺎﺕ‬
‫ﺍﻟﻤﻐﻁـﺎﺓ‬ ‫ﺍﻟﻜﺘﺎﺒـﺔ‬ ‫ﺘﻘﻨﻴـﺔ‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﺴﺭﻴﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻘﺘﺭﺤﺔ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﺘﻁﺒﻴﻕ‬ ‫ﺨﻼل‬ ‫ﻤﻥ‬
‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻨﺘﺎﺌﺞ‬ ‫ﺨﻼل‬ ‫ﻭﻤﻥ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻭﺍﻟﻘﻨﻭﺍﺕ‬‫ﺍﻟﺘﻭﺼل‬ ‫ﺘﻡ‬ ‫ﻋﻠﻴﻬﺎ‬ ‫ﺍﻟﺤﺼﻭل‬ ‫ﺘﻡ‬‫ﺇﻟﻰ‬‫ﺍﻻﺴﺘﻨﺘﺎﺠﺎﺕ‬‫ﺍﻵﺘﻴﺔ‬:
.1‫ﺇﺠﺭﺍﺀ‬‫ﻭﺍﻟﻤﺴﺘﻠﻡ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻁﺭﻕ‬ ‫ﺒﻴﻥ‬ ‫ﻤﺭﺌﻲ‬ ‫ﻏﻴﺭ‬ ‫ﺍﺘﺼﺎل‬‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬‫ﻓﻲ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻤﺴﺘﻭﻯ‬ ‫ﻤﻥ‬ ‫ﻗﻠل‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬
‫ﺴﺭﻱ‬ ‫ﺍﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬.
.2‫ﻗﻴﻤ‬ ‫ﺘﻘﻠﻴل‬ ‫ﺒﻌﺩ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬ ‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﺤﺴﺎﺏ‬ ‫ﻭﻴﻌﻴﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺍﻟﻤﻭﺠﻪ‬ ‫ﻴﺴﺘﻘﺒل‬‫ﺔ‬
TTL‫ﺍﻟﻭﺠﻬﺔ‬ ‫ﻋﻨﻭﺍﻥ‬ ‫ﻴﻔﺤﺹ‬ ‫ﻭﻜﺫﻟﻙ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﻬﻤل‬ ‫ﺍﺨﺘﻼﻓﻪ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﻭﺍﺤﺩ‬ ‫ﺒﻤﻘﺩﺍﺭ‬،‫ﺒﺙ‬ ‫ﻋﻨﻭﺍﻥ‬ ‫ﻜﺎﻥ‬ ‫ﻓﺎﻥ‬
Broad Cast‫ﺇﺭﺴﺎﻟﻬﺎ‬ ‫ﻴﻤﻨﻊ‬‫ﺇﻟﻰ‬‫ﺸﺒﻜﺔ‬‫ﺃﺨﺭﻯ‬.
.3‫ﺃﻅﻬﺭﺕ‬‫ﺍﻟﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬‫ﺍﻵﺘﻴﺔ‬:
‫ﺃ‬-‫ﺃﻋﻁﻰ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬IP‫ﺠﻴﺩ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﻏﻴﺭ‬ ‫ﻤﻥ‬ ‫ﻭﺼﻭﺭﺓ‬ ‫ﻨﺼﻲ‬ ‫ﻤﻠﻑ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﹰ‬‫ﺍ‬‫ﺠﺩ‬ ‫ﺓ‬
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻤﺭﻭﺭ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﺘﺄﺜﻴﺭ‬.
‫ﺏ‬-‫ﺃﻋﻁﻰ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﺠﻴﺩﺓ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﻷﻨﻪ‬‫ﻤﻭﺜﻭﻗﺎ‬ ‫ﺍﺘﺼﺎﻻ‬ ‫ﻴﻭﻓﺭ‬.
‫ﺝ‬-‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻴﻭﻓﺭ‬UDP‫ﻤﺨﻔﻴﺎ‬ ‫ﺍﺘﺼﺎﻻ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬،‫ﻋﻠﻴـﻪ‬ ‫ﻤﻌﺘﻤﺩ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﻫﺫﺍ‬ ‫ﻭﻟﻜﻥ‬
‫ﻷﻥ‬ ‫ﻭﺫﻟﻙ‬‫ﺁﻟﻴﺔ‬‫ﻋﻤل‬ ‫ﺍﺘﺼﺎل‬‫ﺒﻪ‬ ‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬.
‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬
٤٩
‫ﺩ‬-‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻴﻭﻓﺭ‬ICMP‫ﻤﺴﺎﺤﺎﺕ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﻤﺴﺎﺤﺎﺕ‬ ‫ﻤﻥ‬ ‫ﺍﻜﺒﺭ‬
‫ﺍﻟﺘﺸﺨﻴﺹ‬ ‫ﻓﻲ‬ ‫ﺍﺴﺘﺨﺩﺍﻤﻪ‬ ‫ﻟﻜﺜﺭﺓ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺒﻌﺙ‬ ‫ﻭﻟﻜﻨﻪ‬ ‫ﺍﻟﺴﺎﺒﻘﺔ‬‫ﺃﺨﻁﺎﺀ‬‫ﺍﻟﺸﺒﻜﺔ‬.
‫ﻴﻤﻜﻥ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺠﻡ‬ ‫ﻓﺎﻥ‬ ‫ﺒﺎﻟﺘﺎﻟﻲ‬‫ﺇﺨﻔﺎﺀﻫﺎ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻀﻤﻥ‬‫ﺍﻟﺘـﻲ‬ ‫ﺍﻟﻤﺴﺎﺤﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﺘﻤﺩ‬
‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺍﺯﺩﻴﺎﺩ‬ ‫ﻤﻊ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻟﻺﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻁﻠﻭﺒﺔ‬ ‫ﺍﻟﺤﺯﻡ‬ ‫ﻋﺩﺩ‬ ‫ﻭﻴﺯﺩﺍﺩ‬ ‫ﻟﻺﺨﻔﺎﺀ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﻠﻙ‬ ‫ﺘﻭﻓﺭﻫﺎ‬
‫ﺇﺨﻔﺎﺀﻩ‬.
‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬
٥٠
‫ﺍﻟﻤﺼﺎﺩﺭ‬
[1]‫ﻋﻼﺀ‬ ‫ﻤﺤﻤﺩ‬ ،‫ﻭﺍﻟﺤﻤﺎﻤﻲ‬ ‫ﺤﺴﻴﻥ‬ ‫ﻋﻼﺀ‬ ،‫ﺍﻟﺤﻤﺎﻤﻲ‬)2008(،"‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬:‫ﻭﺍﻟﻌﻼﻤـﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻜﺘﺎﺒﺔ‬
‫ﺍﻟﻤﺎﺌﻴﺔ‬"‫ﺇﺜﺭﺍﺀ‬ ،‫ﺍﻟﺸﺎﺭﻗﺔ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴﻊ‬ ‫ﻟﻠﻨﺸﺭ‬.
[2]،‫ﻓﺎﺩﻱ‬ ،‫ﺍﻟﻘﺎﺩﺭ‬ ‫ﻋﺒﺩ‬)2006(،"‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﻭﺍﻟﻨﻅﻡ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﺭﻤﺠﺔ‬ ‫ﺍﺤﺘﺭﻑ‬"،‫ﺃﺯﻤﻨﺔ‬‫ﻋﻤﺎﻥ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴﻊ‬ ‫ﻟﻠﻨﺸﺭ‬
‫ﺍﻷﺭﺩﻥ‬.
[3]،‫ﻋﻤﺎﺭ‬ ،‫ﻋﺭﻴﺎﻥ‬)2003(،"‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺸﺎﻤل‬ ‫ﺍﻟﻤﺭﺠﻊ‬"‫ﺴﻭﺭﻴﺔ‬ ،‫ﺤﻠﺏ‬ ،‫ﻭﺍﻟﻌﻠﻭﻡ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺸﻌﺎﻉ‬ ،.
[4]،‫ﻭﻴﻠﻴﻨﺴﻜﻲ‬ ،‫ﻭﻤﺎﺭﺸﺎل‬ ‫ﻜﺎﻨﺩﺍﺱ‬ ،‫ﻟﻴﺩﻥ‬)2000(،"TCP/IP"،‫ﺍﻟﻘـﺎﻫﺭﺓ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴـﻊ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺍﻟﻔﺎﺭﻭﻕ‬ ‫ﺩﺍﺭ‬ ،
‫ﻤﺼﺭ‬.
[5]،‫ﺸﻴﺨﻭ‬ ‫ﻤﺤﻤﺩ‬ ،‫ﻤﻌﻤﻭ‬)2005(،"‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻤﺒﺎﺩﺉ‬TCP/IP"‫ﺴﻭﺭﻴﺔ‬ ،‫ﺤﻠﺏ‬ ،‫ﻭﺍﻟﻌﻠﻭﻡ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺸﻌﺎﻉ‬ ،.
[6]،‫ﺒﻴﺒﻭ‬‫ﺃﻤﻴﺭﺓ‬،)2009(،"‫ﺘﻘﻨﻴﺎﺕ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟـﺸﺒﻜﺔ‬ ‫ﻭﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﺍﻟﻌﺼﺒﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬"،
‫ﻗ‬ ، ‫ﻤﺎﺠﺴﺘﻴﺭ‬ ‫ﺭﺴﺎﻟﺔ‬‫ﺍﻟﻌﺭﺍﻕ‬ ،‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬ ،‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎﺕ‬ ‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻋﻠﻭﻡ‬ ‫ﻜﻠﻴﺔ‬ ،‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻋﻠﻭﻡ‬ ‫ﺴﻡ‬.
[7] Ahsan, Kamran (2002), "Covert channel analysis and data hiding in TCP/IP",
Unpublished M. Sc. Thesis, University of Toronto, Canada.
[8] Bharti, Vishal and Snigdh, Itu (2008), "Practical Development and Deployment
of Covert Communication in IPV4", Birla Institute of Technology, India.
[9] Cabuk, Serdar , Brodley, Carla and Shields, Clay (2004), "IP Covert Timing
Channels: An Initial Exploration", Washington, USA.
[10] Forouzan, Behrouz A., (2003), "TCP/IP: Protocol Suite", McGraw-Hill, USA.
[11] Kwecka, Zbigniew, (2006), "Application Layer Covert Channel Analysis and
Detection", University for the degree of Bachelor of Science with Honours in
Networked Computing, Napier University, Edinburgh.
[12] Lampson, Butler W., (1973), "A Note on the Confinement Problem", pp 613-
615.
[13] Murdoch, Steven J., (2007), "Covert Channel Vulnerabilities in Anonymity
Systems", Unpublished Ph.D. Thesis, University of Cambridge.
[14] Pozo, Rubén Rios del, (2007), "Information Hiding in Networks Covert
Channels", Skovde University.
[15] Siddiqui, Kashif Ali, (2003), "Covert Chanaels in TCP/IP & Protocol
Steganography".
[16] Smeets, Marc and Koot, Matthijs, (2006), "Covert Channels", Unpuplished M.
Sc. Thesis, University of Amsterdam. msmeets,mrkoot}@os3.nl
[17] Zander, Sebastian , Armitage, Grenville and Branch, Philip (2006), "Covert
Channels in the IP Time To Live Field", Swinburne University of Technology
Australia.

More Related Content

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Steganography methods using network protocols

  • 1. ‫ﺍﻟﻤﺠﻠﺩ‬ ‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎﺕ‬ ‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻟﻌﻠﻭﻡ‬ ‫ﺍﻟﺭﺍﻓﺩﻴﻥ‬ ‫ﻤﺠﻠﺔ‬)٨(‫ﺍﻟﻌﺩﺩ‬)٢(٢٠١١ ٣٥ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻤ‬‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﻴﻭﻨﺱ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﺃﻤﻴﺭﺓ‬ ‫ﺍﻟﺤﺎﺴ‬ ‫ﻋﻠﻭﻡ‬ ‫ﻜﻠﻴﺔ‬‫ﻭ‬‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎ‬ ‫ﺏ‬‫ﺕ‬‫ﺍﻟﺠﺎﻤﻌﺔ‬ ‫ﺭﺌﺎﺴﺔ‬ ‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﺍﺴﺘﻼﻡ‬ ‫ﺘﺎﺭﻴﺦ‬:٢٨/٠٤/٢٠١٠‫ﺍﻟﺒﺤﺙ‬ ‫ﻗﺒﻭل‬ ‫ﺘﺎﺭﻴﺦ‬:٢١/٠٦/٢٠١١ ABSTRACT The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear. ‫ﺍﻟﻤﻠﺨﺹ‬ ‫ـﺔ‬‫ﺍﻟﻤﺨﻔﻴـ‬ ‫ـﺯﻥ‬‫ﺍﻟﺨـ‬ ‫ـﺎﺓ‬‫ﻗﻨـ‬ ‫ـﻭﻉ‬‫ﻨـ‬ ‫ـﻥ‬‫ﻤـ‬ ‫ـﺔ‬‫ﺍﻟﻤﺨﻔﻴـ‬ ‫ـﻭﺍﺕ‬‫ﺍﻟﻘﻨـ‬ ‫ـﺘﺨﺩﺍﻡ‬‫ﺍﺴـ‬ ‫ـﺙ‬‫ﺍﻟﺒﺤـ‬ ‫ـﺫﺍ‬‫ﻫـ‬ ‫ـﻲ‬‫ﻓـ‬ ‫ـﻡ‬‫ﺘـ‬ )Covert Storage Channel(‫ﺼﻭﺭﺓ‬ ‫ﺃﻭ‬ ‫ﻨﺼﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬‫ﺨﻔﻰ‬‫ﻤ‬‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺴﺭﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻨﻤﻭﺫﺝ‬ ‫ﻓﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﻭﻁﺒﻘﺔ‬ ‫ﺍﻟﻨﻘل‬TCP/IP‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﺤﻴﺙ‬ ،IP‫ﻤﺨﻔﻴـﺔ‬ ‫ﻗﻨـﺎﺓ‬ ‫ﺘـﺼﻤﻴﻡ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Identification‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ،TCP‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍ‬ ‫ﻤﺅﺸﺭ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﻟﺤﺎﻟﺔ‬Urgent Pointer‫ﻭﺒﺭﻭﺘﻭﻜﻭل‬ ،UDP‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻤﻨﻔﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Source Port، ‫ﺍﻟﺒﺭﺘﻭﻜﻭل‬ ‫ﻭﺃﺨﻴﺭﺍ‬ICMP‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﻫﻴﻜﻠﻴﺔ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Echo Request‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺤﻘل‬Message. ‫ﺘـﺼﻤﻴﻡ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺘﺤﻠﻴل‬ ‫ﺒﻌﺩ‬ ‫ﻅﻬﺭﺕ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﻜﺎﻨﺕ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻟﻴﻥ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺼﻭل‬ ‫ﻭﻨﺴﺒﺔ‬ ،‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺤﻘل‬ ‫ﻋﻠﻰ‬ ‫ﺍﻋﺘﻤﺩﺕ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ IP‫ﻭ‬TCP%100،‫ﺃﻤﺎ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬UDP‫ﻋﻠﻰ‬ ‫ﻓﻴﻌﺘﻤﺩ‬‫ﺁﻟﻴ‬‫ﺔ‬،‫ﹰ‬‫ﺎ‬‫ﻤﻭﺜﻭﻗ‬ ‫ﹰ‬‫ﻻ‬‫ﺍﺘﺼﺎ‬ ‫ﺘﺅﻤﻥ‬ ‫ﻻ‬ ‫ﺍﻟﺘﻲ‬ ‫ﻋﻤﻠﻪ‬‫ﺃﻤﺎ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬ ICMP‫ﻤﻘﺒﻭﻻ‬ ‫ﺇﺭﺴﺎﻻ‬ ‫ﻭﻓﺭ‬ ‫ﻓﺄﻨﻪ‬‫ﻤﻌﺭﻭﻓـﺔ‬ ‫ﺘﻜـﻭﻥ‬ ‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﻻﻥ‬ ‫ﻭﺫﻟﻙ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺒﻌﺙ‬ ‫ﻭﻟﻜﻨﻪ‬ ‫ﻭﻭﺍﻀﺤﺔ‬. 1-‫ﺍﻟﻤﻘﺩﻤﺔ‬ ،‫ﺃﻫﻤﻴﺘﻬـﺎ‬ ‫ﻭﺍﺯﺩﻴﺎﺩ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺜﻭﺭﺓ‬ ‫ﻋﺼﺭ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻤﻊ‬ ‫ﻟﻠﺘﻌﺎﻤل‬ ‫ﺍﻟﺠﺩﻴﺩﺓ‬ ‫ﺍﻟﺒﻴﺌﺔ‬ ‫ﻫﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺸﺒﻜﺔ‬ ‫ﻭﻴ‬‫ﺨﺼﻭﺼﻴﺔ‬ ‫ﻭﺤﻤﺎﻴﺔ‬ ‫ﺤﻤﺎﻴﺘﻬﺎ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺠﺎﺩ‬ ‫ﺍﻟﺘﻔﻜﻴﺭ‬ ‫ﺘﻭﺠﺏ‬‫ﺍﻷﻓﺭﺍﺩ‬‫ﺘﻌﺩ‬ ‫ﻟﻡ‬ ‫ﻟﺫﻟﻙ‬ ،‫ﻋﻠﻴﻬﺎ‬ ‫ﺍﻟﻌﺎﻤﻠﻴﻥ‬‫ﺍﻷﻤﻨﻴﺔ‬‫ﻤﺘﻌﻠﻘﺎ‬ ‫ﻤﻭﻀﻭﻋﺎ‬ ‫ﺍﻟﺴﻴﺎﺴﺎﺕ‬ ‫ﻭﻭﻀﻊ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺒﻁﺭﺍﺌﻕ‬‫ﺍﻷﻤﻨﻴﺔ‬‫ﺍﻻﺘﺼﺎﻻﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺜﻐﺭﺍﺕ‬ ‫ﻋﻥ‬ ‫ﻭﺍﻟﺒﺤﺙ‬‫ﻭﺇﻨﻤﺎ‬‫ﺍﻟﻤـﺭﻭﺭ‬ ‫ﺃﻤﻨﻴﺔ‬
  • 2. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٣٦ ‫ﹰ‬‫ﺎ‬‫ﺃﻴﻀ‬‫ﻏ‬ ‫ﻭﺃﻥ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻓﻲ‬ ‫ﹰ‬‫ﺍ‬‫ﻤﻭﺠﻭﺩ‬ ‫ﺠﻭﻫﺭﻫﺎ‬ ‫ﻴﻜﻭﻥ‬ ‫ﺍﻟﺘﻲ‬،‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﻤﺤﺘﻭﻯ‬ ‫ﺤﻤﺎﻴﺔ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺎﻴﺔ‬‫ﺃﻤـﺎ‬‫ﻏﺎﻴـﺔ‬ ‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺠﻭﺩ‬ ‫ﺃﺨﻔﺎﺀ‬ ‫ﻓﻬﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.[6] ،‫ﻤﺤﻭﺭﻴﻥ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻴﺘﻨﺎﻭل‬‫ﺍﻷﻭل‬‫ﻭﺍﻟﻨﻤـﻭﺫﺝ‬ ‫ﻟﻬـﺎ‬ ‫ﺍﻟﻬﺭﻤﻴـﺔ‬ ‫ﻭﺍﻟﺒﻨﻴـﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﹰ‬‫ﺎ‬‫ﺘﻌﺭﻴﻔ‬ ‫ﺘﻀﻤﻥ‬ TCP/IP‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻟﻤﺠﻤﻭﻋﺔ‬ ‫ﹰ‬‫ﺎ‬‫ﻭﺸﺭﺤ‬TCP/IP.‫ﺃﻤﺎ‬‫ﺍ‬ ‫ﻋـﻥ‬ ‫ﻤﻘﺩﻤـﺔ‬ ‫ﺘﻀﻤﻥ‬ ‫ﻓﻘﺩ‬ ‫ﺍﻟﺜﺎﻨﻲ‬ ‫ﺍﻟﻤﺤﻭﺭ‬‫ﻟﻘﻨـﻭﺍﺕ‬ ‫ـﻭﻻﺕ‬‫ـ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜ‬ ‫ـل‬‫ـ‬‫ﻤﺜ‬ ‫ـﺸﺒﻜﺔ‬‫ـ‬‫ﺍﻟ‬ ‫ـﻭﻻﺕ‬‫ـ‬‫ﺒﺭﻭﺘﻭﻜ‬ ‫ـﻲ‬‫ـ‬‫ﻓ‬ ‫ـﺔ‬‫ـ‬‫ﺍﻟﻤﺨﻔﻴ‬ ‫ـﻭﺍﺕ‬‫ـ‬‫ﻟﻠﻘﻨ‬ ‫ـﺭﺤﺎ‬‫ـ‬‫ﺸ‬ ‫ـﻡ‬‫ـ‬‫ﺜ‬ ،‫ـﺼﻨﻴﻔﻬﺎ‬‫ـ‬‫ﻭﺘ‬ ‫ـﺔ‬‫ـ‬‫ﺍﻟﻤﺨﻔﻴ‬ IP،TCP،UDP،ICMP. ‫ﻷﻱ‬ ‫ﻴﻤﻜـﻥ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﻓﻔﻲ‬ ،‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺜﻭﻗﻴﺔ‬ ‫ﺘﺄﻜﻴﺩ‬ ‫ﻓﻲ‬ ‫ﺍﺨﺘﻼﻓﻬﻤﺎ‬ ‫ﻤﻊ‬ ‫ﻴﺴﺘﺨﺩﻤﺎﻥ‬ ‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻋﻠﻤﻲ‬ ‫ﺇﻥ‬ ،‫ﻤﺸﻔﺭﺓ‬ ‫ﺒﻁﺭﻴﻘﺔ‬ ‫ﻴﺘﺼﻼﻥ‬ ‫ﻁﺭﻓﻴﻥ‬ ‫ﺜﻤﺔ‬ ‫ﺇﻥ‬ ‫ﻴﻜﺘﺸﻑ‬ ‫ﺃﻥ‬ ‫ﻁﺭﻑ‬‫ﺃﻤﺎ‬‫ﺇﺨﻔﺎ‬ ‫ﻓﻲ‬‫ﺍﻻﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬ ‫ﺃﺼﻼ‬ ‫ﻓﻴﺨﻔﻰ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺀ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﻗﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻴﺘﺒﺎﺩﻻﻥ‬ ‫ﻁﺭﻓﻴﻥ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻴﻼﺤﻅ‬ ‫ﺃﻥ‬ ‫ﻷﺤﺩ‬ ‫ﻴﻤﻜﻥ‬ ‫ﻓﻼ‬.‫ﺇﺨﻔـﺎﺀ‬ ‫ﺒﻴﻥ‬ ‫ﻋﺩﻴﺩﺓ‬ ‫ﻓﺭﻭﻗﺎﺕ‬ ‫ﻭﺜﻤﺔ‬ ‫ﺍﻟﺠﺩﻭل‬ ‫ﻓﻲ‬ ‫ﻤﻭﻀﺤﺔ‬ ‫ﻭﻫﻲ‬ ‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬)1.([1] ‫ﺠﺩﻭل‬)1(.‫ﻭﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺃﺨﻔﺎﺀ‬ ‫ﺒﻴﻥ‬ ‫ﺍﻟﻔﺭﻕ‬ ‫ﺍﻟﻤﻌﻠــﻭﻤﺎﺕ‬ ‫ﺇﺨﻔــﺎﺀ‬‫ﺍﻟﺘﺸــ‬‫ــﻔﻴﺭ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻭﺠﻭﺩ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﻤل‬‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻤﺤﺘﻭﻴﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﻤل‬ ‫ﺍﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻴﺤﺎﻭل‬‫ﺩﻟﻴﻼ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﻴﻜﻭﻥ‬ ‫ﻋﻨﺼﺭ‬ ‫ﻫﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﻨﺘﻴﺠﺔ‬_‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺸﻔﺭ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻫﻲ‬ ‫ﻟﻠﺘﺸﻔﻴﺭ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﻨﺘﻴﺠﺔ‬ ‫ﻁﺭﺍﺌﻕ‬ ‫ﻫﺩﻑ‬‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺭﺍﻗـﺏ‬ ‫ﻤﻨـﻊ‬ ‫ﺍﻟﻌﺎﻟﻴﺔ‬ ‫ﺍﻷﻤﻨﻴﺔ‬ ‫ﺫﺍﺕ‬ ‫ﺍ‬‫ﺃﺼﻼ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻤﻌﺭﻓﺔ‬ ‫ﻤﻥ‬ ‫ﻟﻭﺴﻴﻁ‬ ‫ﺍﻟﺤﺼﻭل‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺘﻁﻔل‬ ‫ﻤﻨﻊ‬ ‫ﺍﻟﻘﻭﻴﺔ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﻁﺭﺍﺌﻕ‬ ‫ﻫﺩﻑ‬ ‫ﺍﻟﻤﺸﻔﺭ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻭﺍﻀﺢ‬ ‫ﺍﻟﻨﺹ‬ ‫ﻋﻥ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺃﻴﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻭﺠﻡ‬‫ﻫ‬ ‫ﺍﻟﺫﻱ‬ ‫ﺍﻟﻁﺒﻴﻌـﺔ‬ ‫ﻋﻠـﻰ‬ ‫ﻴﻌﺘﻤـﺩ‬ ‫ﺒل‬ ‫ﻤﺤﺩﺩﺓ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺜﻤﺔ‬ ‫ﻟﻴﺴﺕ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺸﺭﻴﺔ‬ ‫ﻤﻌﺭﻭﻓﺔ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﺘﻤﺩ‬ ‫ﻋ‬ ‫ﻟﻜﻥ‬ ،‫ﺒﺼﻤﺔ‬ ‫ﻟﻪ‬ ‫ﻟﻴﺱ‬‫ﻴـﺘﻡ‬ ‫ﺍﻹﺨﻔـﺎﺀ‬ ‫ﻁﺭﻴﻘـﺔ‬ ‫ﻤﻌﺭﻓـﺔ‬ ‫ﻨﺩ‬ ‫ﺍﻟ‬ ‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬‫ﺴﺭﻴﺔ‬ ‫ﻟﻠﻤﻬﺎﺠﻡ‬ ‫ﺘﺴﻤﺢ‬ ‫ﻀﻌﻑ‬ ‫ﻨﻘﺎﻁ‬ ‫ﺘﺸﻔﻴﺭ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﻟﻜل‬ ‫ﺘﻭﺠﺩ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﺒﺎﺴﺘﺭﺠﺎﻉ‬ ‫ﻟﻠﺤـﺼﻭل‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻤﻊ‬ ‫ﺍﻟﺘﺸﻔﻴﺭ‬ ‫ﺩﻤﺞ‬ ‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻤﻥ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﻋﻠﻰ‬‫ﻋﺎﻟﻲ‬‫ﺍﻷﻤﻨﻴﺔ‬ ‫ﺘـﺸﻔﻴﺭ‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﺤﺼﻭل‬ ‫ﺘﺸﻔﻴﺭ‬ ‫ﻁﺭﻴﻘﺘﻲ‬ ‫ﺩﻤﺞ‬ ‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻤﻥ‬ ‫ﻤﺯﺩﻭﺝ‬ -2‫ﺍ‬ ‫ﺍﻟﺩﺭﺍﺴﺎﺕ‬‫ﻟﺴﺎﺒﻘﺔ‬ ‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﺤﺎﻭل‬‫ﺇﻴﺠﺎﺩ‬‫ﺘﻘﻨﻴﺎﺕ‬‫ﺇﺨﻔﺎﺀ‬‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺭﻴﻊ‬ ‫ﺍﻟﺘﻁﻭﺭ‬ ‫ﺘﻭﺍﻜﺏ‬ ‫ﻤﺘﻁﻭﺭﺓ‬‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻤﻨﻬﻡ‬ ،‫ﻭﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﻤﻥ‬‫ﺃﻨﺠﺯ‬،‫ﺍﻻﺼﻁﻨﺎﻋﻲ‬ ‫ﺍﻟﺫﻜﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻤﻊ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﻟﺭﺒﻁ‬ ‫ﻭﺍﺴﻌﺔ‬ ‫ﻭﺩﺭﺍﺴﺎﺕ‬ ‫ﺒﺤﻭﺜﺎ‬‫ﻭﺁﺨﺭﻭﻥ‬‫ﺃﻨﺠﺯﻭﺍ‬ ‫ﻭﺍ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺨﻼل‬ ‫ﻤﻥ‬ ‫ﺍﻟﺤﺎﺴﻭﺏ‬ ‫ﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺭﻱ‬ ‫ﺍﻻﺘﺼﺎل‬‫ﻭﻤﻥ‬ ،‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻐﻁﺎﺓ‬ ‫ﻟﻜﺘﺎﺒﺔ‬ ‫ﺍﻟﺒﺤﻭﺙ‬ ‫ﻫﺫﻩ‬: .1‫ﻋﺎﻡ‬ ‫ﻓﻲ‬1989‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬Wolf‫ﻭ‬Girling‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﺤﺸﻭﺓ‬ ‫ﺤﻘل‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬padding field‫ﻤـﺜﻼ‬ ، ‫ﻤﻥ‬ ‫ﺍﻗل‬ ‫ﻁﻭﻟﻬﺎ‬ ‫ﻴﻜﻭﻥ‬ ‫ﻋﻨﺩﻤﺎ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﺍﻻﻴﺜﺭﻨﺕ‬ ‫ﺘﺤﺸﻭ‬60Bytes،‫ﺇﺫ‬‫ﻴﺘﻡ‬‫ﺇﻀﺎﻓﺔ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﺸﻭﺓ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬IP‫ﺍﻟﻨﻘل‬ ‫ﻭﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺤﺠﻡ‬ ‫ﻟﻴﺼﺒﺢ‬64Bytes‫ﻟﺤﺯﻤـﺔ‬ ‫ﺒـﻪ‬ ‫ﻤـﺴﻤﻭﺡ‬ ‫ﺤﺠﻡ‬ ‫ﺍﻗل‬ ‫ﻭﻫﻭ‬ ‫ﺍﻟﺸﺒﻜﺔ‬.[17]
  • 3. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٣٧ .2‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2002‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻗﺩﻡ‬Ahsan‫ﻫﻲ‬ ‫ﺍﻻﻭﻟﻰ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﻘﻨﻴﺘﻴﻥ‬ ‫ﺘﻀﻤﻥ‬ ‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﻭ‬TCP‫ﻭﺍﻟﺜﺎﻨﻴﺔ‬ ،‫ﻫﻲ‬‫ﺇﻋﺎﺩﺓ‬‫ﺒﺎ‬ ‫ﺍﻟـﺸﺒﻜﺔ‬ ‫ﺤـﺯﻡ‬ ‫ﺘﺭﺘﻴـﺏ‬‫ﺒﺭﻭﺘﻭﻜـﻭل‬ ‫ﺴـﺘﺨﺩﺍﻡ‬ IPSec.[7] .3‫ـﺎﻥ‬‫ـ‬‫ﺍﻟﺒﺎﺤﺜ‬ ‫ـﺩﻡ‬‫ـ‬‫ﻗ‬ ‫ـﺴﻪ‬‫ـ‬‫ﻨﻔ‬ ‫ـﺎﻡ‬‫ـ‬‫ﺍﻟﻌ‬ ‫ﻭﻓـﻲ‬Ahsan‫ﻭ‬Kundur‫ـﻡ‬‫ـ‬‫ﺍﻟﻌﻠ‬ ‫ـﺔ‬‫ـ‬‫ﻗﻴﻤ‬ ‫ـﺘﺨﺩﺍﻡ‬‫ـ‬‫ﺍﺴ‬ ‫ـﺎ‬‫ـ‬‫ﻓﻴﻬ‬ ‫ـﺎ‬‫ـ‬‫ﺍﻗﺘﺭﺤ‬ ‫ـﺔ‬‫ـ‬‫ﻁﺭﻴﻘ‬ Don't fragment)DF(‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﻹﺨﻔﺎﺀ‬‫ﺜﻨﺎﺌﻴﺔ‬ ‫ﻗﻴﻡ‬)0(‫ﺃﻭ‬)1(‫ﻓـﻲ‬ ‫ﻓﻘﻁ‬ ‫ﻭﺫﻟﻙ‬ ‫ﺍﻟﻌﻅﻤﻰ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻭﺤﺩﺓ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻤﻌﺭﻓﺔ‬ ‫ﺤﺎﻟﺔ‬Maximum Transfer Unit)(MTU،‫ﺍﻟﻤﺴﺘﻠﻡ‬ ‫ﺇﻟﻰ‬ ‫ﻟﻠﻁﺭﻴﻕ‬ ‫ﺍﻟﻌﻅﻤﻰ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻭﺤﺩﺓ‬ ‫ﺤﺠﻡ‬ ‫ﻤﻥ‬ ‫ﺍﻗل‬ ‫ﺤﺠﻡ‬ ‫ﺫﺍﺕ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻓﻴﺭﺴل‬.[Kundur,2002] .4‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻓﻲ‬ ‫ﻭﻗﺩﻡ‬Fisk‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﻁﺭﻴﻘﺔ‬ ‫ﻓﻴﻪ‬ ‫ﺍﻗﺘﺭﺡ‬ ‫ﹰ‬‫ﺎ‬‫ﺒﺤﺜ‬‫ﻹﺨﻔـﺎﺀ‬‫ﻤﻘﻁـﻊ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬ ‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP)TCP segment(‫ﺍ‬ ‫ﻴﻜﻭﻥ‬ ‫ﻋﻨﺩﻤﺎ‬‫ﻟﻌﻠﻡ‬TCP reset(RST)‫ﻴﻌﻤل‬ ‫ﺍﻟﻌﻠﻡ‬ ‫ﻭﻫﺫﺍ‬ ،‫ﻤﺸﻐﻼ‬ ‫ﻭﻻ‬ ،‫ﺍﻻﺘﺼﺎل‬ ‫ﻗﻁﻊ‬ ‫ﻋﻠﻰ‬‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﻘﻁﻊ‬ ‫ﻫﺫﺍ‬ ‫ﻴﺤﺘﻭﻱ‬.[17] .5‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2004‫ﺍﻟﺒﺎﺤﺙ‬ ‫ﻗﺩﻡ‬Lliamas‫ﻭﻜﻴل‬ ‫ﺨﺎﺩﻡ‬ ‫ﻓﻴﻪ‬ ‫ﺼﻤﻡ‬ ‫ﺒﺤﺜﺎ‬Server proxy‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﻘﻨـﺎﺓ‬ ‫ﻓﻲ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬Identification‫ﺍﻟﺒﺭﻭﺘ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬‫ﻭﻜﻭل‬IP‫ﻤـﻥ‬ ‫ﻤﻌﻴﻨـﺔ‬ ‫ﺨﺩﻤﺔ‬ ‫ﻁﻠﺏ‬ ‫ﻋﻨﺩ‬ ‫ﺍﻟﺨﺎﺩﻡ‬.[Lliamas,2004] .6‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﻗﺩﻡ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻭﻓﻲ‬Cauich‫ﻭ‬Gomez‫ﻭ‬Watanabe‫ﺘﺭﻭﻴـﺴﺔ‬ ‫ﻓـﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤـﺎﺕ‬ ‫ﻹﺨﻔـﺎﺀ‬ ‫ﺒﺤﺜﺎ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬IP‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﻓﻲ‬Identification‫ﻭﺤﻘل‬‫ﺍﻟﺠﺯﺀ‬ ‫ﺍﻨﺯﻴﺎﺡ‬Fragment Offset‫ﻓـﻲ‬ ‫ﻗ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺠﺯﺌﺔ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻭﺠﻭﺩﺓ‬ ‫ﺍﻟﻤﻭﺠﻬﺎﺕ‬ ‫ﺒل‬.[Cauich,2004] .7‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2005‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬Bharti‫ﻭ‬Snigdh‫ﺒﺤﺜﺎ‬‫ﻹﺨﻔﺎﺀ‬‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬IP‫ﻭ‬TCP‫ﻭﺍﻗﺘﺭﺤﺎ‬ ‫ﺃﻓﻀل‬‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻫﺫﻩ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ ‫ﺤﻘﻭل‬‫ﻹﺨﻔﺎﺀ‬‫ﺍﻟﻤﺯﺩﺤﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬.[8] .8‫ﻨﻔ‬ ‫ﺍﻟﻌﺎﻡ‬ ‫ﻭﻓﻲ‬‫ﺍﻟﺒﺎﺤﺜﺎﻥ‬ ‫ﻗﺩﻡ‬ ‫ﺴﻪ‬Murdoch‫ﻭ‬Lwies‫ﺍﻟﺘﻌﺭﻴـﻑ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﻭﺍﺕ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺒﺤﺜﺎ‬ Identification‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP‫ﺍﻟﺘﺴﻠـﺴﻠﻲ‬ ‫ﺍﻟﺭﻗﻡ‬ ‫ﻭﺤﻘل‬ ،Sequence Number‫ﻓـﻲ‬ ‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺘﺸﻐﻴل‬ ‫ﻨﻅﺎﻡ‬ ‫ﺒﻴﺌﺔ‬ ‫ﻓﻲ‬Linux.[13] .9‫ﻋﺎﻡ‬ ‫ﻓﻲ‬2006‫ﺍﻟﺒﺎﺤﺜﻭﻥ‬ ‫ﻗﺩﻡ‬Zander‫ﻭ‬Armitage‫ﻭ‬Branch‫ﺒﺤﺜﺎ‬‫ﻹﺨﻔـﺎﺀ‬‫ﻤـﺩﺓ‬ ‫ﺤﻘـل‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬ ‫ﺍﻟﺤﻴﺎﺓ‬Time To Live(TTL)‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP.[17] -3‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒـﻴﻥ‬ ‫ﻭﺍﻟﺘﻔﺎﻋـل‬ ‫ﺍﻻﺘـﺼﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻭﺘﻨﻅﻡ‬ ‫ﺘﺘﺤﻜﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﻭﺍﻹﺠﺭﺍﺀﺍﺕ‬ ‫ﺍﻟﻘﻭﺍﻨﻴﻥ‬ ‫ﻤﻥ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺴﺘﻁ‬ ‫ﻟﻜﻲ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﺨﺘﻠﻔﺔ‬ ‫ﺍﻷﺠﻬﺯﺓ‬‫ﺍﻟﻤﻤﻜﻥ‬ ‫ﻭﻤﻥ‬ ،‫ﺍﻵﺨﺭ‬ ‫ﻤﻨﻬﺎ‬ ‫ﻜل‬ ‫ﻭﻓﻬﻡ‬ ‫ﺒﻌﻀﻬﺎ‬ ‫ﻤﻊ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺍﻷﺠﻬﺯﺓ‬ ‫ﻫﺫﻩ‬ ‫ﻴﻊ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻜﺩﺱ‬ ‫ﻋﻨﺩﺌﺫ‬ ‫ﻭﺘﺴﻤﻰ‬ ،‫ﻤﻌﻴﻥ‬ ‫ﺃﻤﺭ‬ ‫ﻟﺘﻨﻔﻴﺫ‬ ‫ﺒﻌﻀﻬﺎ‬ ‫ﻤﻊ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻋﺩﺓ‬ ‫ﺘﻌﻤل‬ ‫ﺃﻥ‬Protocol Stack، ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﺃﻭ‬Protocol Suite.[5] ‫ﻫﻲ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﺍﻟﺠﻬﺎﺯ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻭﻅﻴﻔﺔ‬ ‫ﺇﻥ‬: .1‫ﺍﻟﺒ‬ ‫ﺘﻘﺴﻴﻡ‬‫ﻤﻘﺎﻁﻊ‬ ‫ﺇﻟﻰ‬ ‫ﻴﺎﻨﺎﺕ‬. .2‫ﺍﻟﺤﺯﻡ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﻌﻨﻭﻨﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﻀﺎﻓﺔ‬. .3‫ﻟﻺﺭﺴﺎل‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﺠﻬﻴﺯ‬. ‫ﻓﻬﻲ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺍﻟﺠﻬﺎﺯ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻭﻅﻴﻔﺔ‬ ‫ﺃﻤﺎ‬:
  • 4. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٣٨ .1‫ﺍﻻﺘﺼﺎل‬ ‫ﻭﺴﻁ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﺍﻟﺘﻘﺎﻁ‬. .2‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺎﺯ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﺇﺩﺨﺎل‬. .3‫ﻭﻗﺭﺍ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻜل‬ ‫ﺘﺠﻤﻴﻊ‬‫ﺍﻟﺤﺯﻡ‬ ‫ﻫﺫﻩ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﻤﻀﺎﻓﺔ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺀﺓ‬. .4‫ﺘﺠﻤﻴﻌﻬﺎ‬ ‫ﻹﻋﺎﺩﺓ‬ ‫ﻤﺅﻗﺘﺔ‬ ‫ﺫﺍﻜﺭﺓ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺤﺯﻡ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻨﺴﺦ‬. .5‫ﻟﻼﺴﺘﺨﺩﺍﻡ‬ ‫ﻗﺎﺒﻠﺔ‬ ‫ﻤﻔﻬﻭﻤﺔ‬ ‫ﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﺭﺍﻤﺞ‬ ‫ﺇﻟﻰ‬ ‫ﺘﺠﻤﻴﻌﻬﺎ‬ ‫ﺍﻟﻤﻌﺎﺩ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻤﺭﻴﺭ‬. 1-3‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﺠﻤﻭﻋﺔ‬TCP/IP ‫ﻷﻫ‬ ‫ﹰ‬‫ﺎ‬‫ﻁﺒﻘ‬ ‫ﺘﺴﻤﻴﺘﻬﺎ‬ ‫ﺘﻤﺕ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻤﺠﻤﻭﻋﺔ‬ ‫ﻫﻲ‬‫ﻭﻫﻤـﺎ‬ ‫ﺍﻟﻤﺠﻤﻭﻋـﺔ‬ ‫ﻓﻲ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻟﻴﻥ‬ ‫ﻡ‬IP ‫ﻭ‬TCP.‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺍﺤﺩ‬ ‫ﻤﻊ‬ ‫ﻴﺘﻌﺎﻤل‬ ‫ﺃﻥ‬ ‫ﻤﺴﺘﺨﺩﻡ‬ ‫ﻷﻱ‬ ‫ﻴﻤﻜﻥ‬ ‫ﻭﻻ‬TCP/IP،‫ﺍﻷﺨﺭﻯ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻋﻥ‬ ‫ﺒﻤﻌﺯل‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻻﻥ‬ ‫ﻭﺫﻟﻙ‬TCP/IP‫ﻁﺒﻘﺔ‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺒﻨﻘل‬ ‫ﺘﻘﻭﻡ‬‫ﺇﻟﻰ‬‫ﺍﻟﻨﻘل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻻﻨﺠﺎﺯ‬ ‫ﹰ‬‫ﺎ‬‫ﺴﻭﻴ‬ ‫ﻭﺘﺘﻌﺎﻤل‬ ‫ﺃﺨﺭﻯ‬.[3] ‫ﺃ‬-‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬IP ‫ﺒﺭﻭ‬ ‫ﻴﻌﺩ‬‫ﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﻤﻜﺩﺱ‬ ‫ﻓﻲ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﻁﺒﻘﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺭﺌﻴﺱ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺘﻭﻜﻭل‬TCP/IP. ‫ﺍﻟﻤﻨﻁﻘﻲ‬ ‫ﺍﻟﻌﻨﻭﺍﻥ‬ ‫ﺘﺤﺩﻴﺩ‬ ‫ﻋﻥ‬ ‫ﻤﺴﺅﻭل‬ ‫ﻭﻫﻭ‬IP address‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺨﻼل‬ ‫ﺘﻨﻘل‬ ‫ﺤﺯﻤﺔ‬ ‫ﻜل‬ ‫ﻭﻭﺠﻬﺔ‬ ‫ﻟﻤﺼﺩﺭ‬.[5]‫ﻭﻴﻤﺜل‬ ‫ﺍﻟﺸﻜل‬)1(‫ﺍﻨﺘﺭﻨﻴﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP ‫ﺍﻟﺸﻜل‬)1(.‫ﺒ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺭﻭﺘﻭﻜﻭل‬IP ‫ﺏ‬-‫ﺒﺎﻹﺭﺴﺎل‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﻴﻬﺩﻑ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻫﻭ‬‫ﺇﻟﻰ‬‫ﻋﺎﻟﻴـﺔ‬ ‫ﺒﻤﻭﺜﻭﻗﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻨﻘل‬ ‫ﺨﺩﻤﺔ‬ ‫ﺘﻭﻓﻴﺭ‬ ‫ﺍﻹﻨﺘﺭﻨﺕ‬ ‫ﺒﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﹰ‬‫ﺎ‬‫ﺩﻭﻤ‬ ‫ﻴﺭﺘﺒﻁ‬ ‫ﻭﻫﻭ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﻤﺘﺼﻠﻴﻥ‬ ‫ﺤﺎﺴﺒﻴﻥ‬ ‫ﺒﻴﻥ‬‫ﺘﻁﺒﻴﻘـﺎﺕ‬ ‫ﻗﺒـل‬ ‫ﻤﻥ‬ ‫ﻭﻴﺴﺘﺨﺩﻡ‬ ، ‫ﺍﺘ‬ ‫ﺘﺘﻁﻠﺏ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻀﻴﺎﻉ‬ ‫ﻋﺩﻡ‬ ‫ﻭﻴﻀﻤﻥ‬ ‫ﹰ‬‫ﺎ‬‫ﻭﻤﻭﺜﻭﻗ‬ ‫ﹰ‬‫ﺎ‬‫ﺁﻤﻨ‬ ‫ﺼﺎﻻ‬[3].‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺘﺤﺘﻭﻱ‬TCP‫ﻋﻠـﻰ‬ ‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻟﻤﻭﺜﻭﻕ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺘﻀﻤﻥ‬ ‫ﺤﻘﻭل‬)2.( ‫ﺍﻟﺸﻜل‬)2(.‫ﺘﺭﻭﻴﺴﺔ‬TCP
  • 5. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٣٩ ‫ﺝ‬-‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﻤﻌﻁﻴﺎﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬UDP ‫ﹰ‬‫ﻻ‬‫ﺍﺘﺼﺎ‬ ‫ﻴﺅﻤﻥ‬ ‫ﻻ‬ ‫ﻭﻫﻭ‬ ‫ﺍﻟﻨﻘل‬ ‫ﻁﺒﻘﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻤﻥ‬ ‫ﻫﻭ‬‫ﹰ‬‫ﺎ‬‫ﻤﻭﺜﻭﻗ‬‫ﻻ‬ ‫ﺍﻱ‬ ،‫ﺍﻟﺒﻴﺎﻨـﺎﺕ‬ ‫ﻭﺼـﻭل‬ ‫ﻴﻀﻤﻥ‬‫ﺇﻟـﻰ‬ ‫ﻜﺎﻤﻠﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬،‫ﻋﻤﻠﻴـﺔ‬ ‫ﻓﻲ‬ ‫ﻋﺎﻟﻴﺔ‬ ‫ﺴﺭﻋﺔ‬ ‫ﻭﺘﺘﻁﻠﺏ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻤﻥ‬ ‫ﻜﺒﻴﺭﺓ‬ ‫ﻜﻤﻴﺎﺕ‬ ‫ﺘﺭﺴل‬ ‫ﺘﻁﺒﻴﻘﺎﺕ‬ ‫ﻓﻲ‬ ‫ﻭﻴﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﻨﻘل‬.‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬)3.([2] ‫ﺍﻟﺸﻜل‬)3(.‫ﺘﺭﻭﻴﺴﺔ‬UDP ‫ﺩ‬-‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ICMP ‫ﻴﻌﺩ‬ICMP‫ﻟﺘ‬ ‫ﺃﺴﺎﺴﻲ‬ ‫ﺒﺸﻜل‬ ‫ﻴﺴﺘﺨﺩﻡ‬ ‫ﹰ‬‫ﻻ‬‫ﺒﺭﻭﺘﻭﻜﻭ‬‫ﺒـﻴﻥ‬ ‫ﺘﺤـﺩﺙ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻤﺸﺎﻜل‬ ‫ﺸﺨﻴﺹ‬‫ﺃﺠﻬـﺯﺓ‬‫ﺍﻟـﺸﺒﻜﺔ‬ ]،‫ﺍﺩﺭﻴﺱ‬٢٠٠٦[.‫ﺭﺴﺎﻟﺔ‬ ‫ﻤﻥ‬ ‫ﻤﺘﻐﻴﺭﺓ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﻘﻭل‬‫ﺇﻟﻰ‬‫ﺃﺨﺭﻯ‬‫ﻓـﻲ‬ ‫ﺘﺘـﺸﺎﺒﻪ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﺠﻤﻴﻊ‬ ‫ﻭﻟﻜﻥ‬ ‫ﺍﻟﺜﻼﺜﺔ‬ ‫ﺍﻟﺤﻘﻭل‬‫ﺍﻷﻭﻟﻰ‬‫ﺍﻟﺸﻜل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬)4.([10] ‫ﺍﻟﺸﻜل‬)4(.‫ﺘﺭﻭﻴﺴﺔ‬ICMP -4‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬Covert Channels ‫ﻭﻫﻲ‬‫ﻟ‬ ‫ﺍﺘﺼﺎل‬ ‫ﻤﺴﺎﺭﺍﺕ‬‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻨﻘل‬ ‫ﻏﺎﻴﺘﻬﺎ‬ ‫ﺘﻜﻥ‬ ‫ﻟﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ،‫ﺘﺼﻤﻴﻤﻬﺎ‬ ‫ﻴﺘﻡ‬ ‫ﻡ‬‫ﺃﺒﺩﺍ‬‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻫﺫﻩ‬ ‫ﻭﺘﺴﺘﺨﺩﻡ‬ ، ‫ﺨﺩﻤـﺔ‬ ‫ﺘﻨﺠـﺯ‬ ‫ﺫﺍﺘﻪ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﻓﻲ‬ ‫ﻭﻫﻲ‬ ‫ﻟﺼﺎﻟﺤﻬﺎ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﺤﺼﻭل‬ ‫ﺃﺠل‬ ‫ﻤﻥ‬ ‫ﺒﻬﺎ‬ ‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺒﺭﺍﻤﺞ‬ ‫ﻗﺒل‬ ‫ﻤﻥ‬ ‫ﺃﺨﺭﻯ‬ ‫ﻟﺒﺭﺍﻤﺞ‬.[12] 1-4‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻨﻴﻑ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻟﻠﻘﻨﻭﺍﺕ‬ ‫ﺭﺌﻴﺴﻴﻥ‬ ‫ﺼﻨﻔﻴﻥ‬ ‫ﺒﻴﻥ‬ ‫ﺍﻟﺘﻤﻴﻴﺯ‬ ‫ﻴﻤﻜﻥ‬‫ﻭﻫﻤﺎ‬:[14] -1‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺨﺯﻥ‬ ‫ﻗﻨﺎﺓ‬Covert Storage Channel ‫ﻤﻌﻠﻭﻤـﺎﺕ‬ ‫ﻭﻗﺭﺍﺀﺓ‬ ‫ﺨﺯﻨﻲ‬ ‫ﻤﻭﻗﻊ‬ ‫ﻓﻲ‬ ‫ﻤﺒﺎﺸﺭﺓ‬ ‫ﻭﻏﻴﺭ‬ ‫ﻤﺒﺎﺸﺭﺓ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻥ‬‫ﻤ‬‫ﹸﻀ‬‫ﺘ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻫﻲ‬ ‫ﺍﻻﺴﺘﺭﺠﺎﻉ‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻭﻗﻊ‬ ‫ﺫﻟﻙ‬.‫ﺇﺭﺴـﺎل‬ ‫ﻴﺘﻁﻠـﺏ‬ ‫ﻤـﺜﻼ‬ ،‫ﺍﻟﻨﻅﺎﻡ‬ ‫ﻓﻲ‬ ‫ﻤﺸﺘﺭﻜﺔ‬ ‫ﻤﺼﺎﺩﺭ‬ ‫ﻭﺠﻭﺩ‬ ‫ﻴﺘﻁﻠﺏ‬ ‫ﻭﻫﺫﺍ‬ ‫ﺍﻟﺤﺭﻓﻴﻥ‬"AB"‫ﺒﺎﺴﺘﺨﺩﺍ‬‫ﺸﻔﺭﺓ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺘﻀﻤﻴﻥ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﺨﺯﻥ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻡ‬Unicode‫ﺍﻟـﺭﻗﻡ‬ ‫ﺤﻘـل‬ ‫ﻓـﻲ‬ ‫ﺍﻟﺤﺭﻓﻴﻥ‬ ‫ﻟﻬﺫﻴﻥ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺘﺴﻠﺴﻠﻲ‬TCP‫ﺍﻟﺤـﺭﻓﻴﻥ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﻴﺘﻡ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﺍﻟﻤﺭﺴل‬ ‫ﻁﺭﻑ‬ ‫ﻓﻲ‬ "AB"‫ﻋﻤﻠﻴﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﻓﻴﻪ‬ ‫ﺨﺯﻨﺕ‬ ‫ﺍﻟﺫﻱ‬ ‫ﻨﻔﺴﻪ‬ ‫ﺍﻟﻤﻜﺎﻥ‬ ‫ﻤﻥ‬‫ﺍﻹﺭﺴﺎل‬‫ﻭﺍﻟﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺘﻤﺜل‬ ‫ﺍﻟﺴﺭﻱ‬ ‫ﺍﻟﻤﺼ‬‫ﺍﻟﻤﺸﺘﺭﻙ‬ ‫ﺩﺭ‬.[11] [8]
  • 6. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٤٠ -2‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﻗﻨﺎﺓ‬Covert Timing Channel ‫ﺯﻤﻨﻴﺔ‬ ‫ﻓﺘﺭﺍﺕ‬ ‫ﺒﺘﻀﻤﻴﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺘﻀﻤﻴﻥ‬ ‫ﻴﺘﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻫﻲ‬)‫ﺘﺄﺨﻴﺭﺍﺕ‬(‫ﺍﻹﺤـﺩﺍﺙ‬ ‫ﻭﻗﻭﻉ‬ ‫ﻋﻠﻰ‬ ‫ﺜﻨﺎﺌﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﻨﻔﻴﺫ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﻭﺼﻭل‬ ‫ﺃﺯﻤﻨﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺜﻼ‬ ،‫ﺍﻟﻨﻅﺎﻡ‬ ‫ﻓﻲ‬)Binary channel.([9] 2-4‫ﻤﻭﺍﺼﻔﺎﺕ‬‫ﺍﻟﻨﺎﺠﺤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻭﻫﻲ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻋﻨﺩ‬ ‫ﻟﻬﺎ‬ ‫ﺍﻟﺘﻨﺒﻪ‬ ‫ﻴﺸﺘﺭﻁ‬ ‫ﻤﻭﺍﺼﻔﺎﺕ‬ ‫ﺜﻤﺔ‬: .1‫ﻴﺸﺘﺭﻁ‬‫ﺃﻥ‬‫ﻭﻤﺘﻨﺎﺴﻘﺔ‬ ‫ﻨﻅﺎﻤﻴﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻀﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺘﺒﺩﻭ‬. .2‫ﹰ‬‫ﺍ‬‫ﻭﺸﺎﺫ‬ ‫ﻁﺒﻴﻌﻲ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻤﺭﻭﺭ‬ ‫ﻴﺠﻌل‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻨﺎﺴﺒﺔ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺤﻘﻭل‬ ‫ﺍﺨﺘﻴﺎﺭ‬. .3‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺨﺘﻴﺎﺭ‬‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻟﻠﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺍﻻﺨﺘﺒﺎﺀ‬ ‫ﻭﻗﺩﺭﺓ‬ ‫ﺴﺭﻴﺔ‬ ‫ﻤﻥ‬ ‫ﻴﺯﻴﺩ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﻴﺌﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺸﺎﺌﻊ‬. 3-4‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺃ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻲ‬IP ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬:[17] [16] [7] .1‫ﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬IPIP Identification .2‫ﺍﻟﺤﻴﺎﺓ‬ ‫ﻤﺩﺓ‬ ‫ﺤﻘل‬Time To Live .3‫ﺍﻟﺨﻴﺎﺭﺍﺕ‬ ‫ﺤﻘل‬IP Option ‫ﺏ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬TCP ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻟﺘﺼﻤﻴﻡ‬ ‫ﺘﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬:[16] [15] [13] ١.‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻤﻨﻔﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬Source Port number ٢.‫ﺍﻟﺘﺴﻠﺴل‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬TCP sequence number ٣.‫ﺍﻹﺸﻌﺎﺭ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬Acknowledgment number ٤.‫ﺤﻘل‬‫ﺍﻟ‬ ‫ﻤﺅﺸﺭ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺤﺎﻟﺔ‬Urgent Pointer ‫ﺝ‬-‫ﺍﻹﺨﻔﺎﺀ‬‫ﻓﻲ‬ICMP ‫ﺭﺴﺎﺌل‬ ‫ﻤﻥ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﻜل‬ ‫ﺃﻥ‬ICMP‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻋﻥ‬ ‫ﺘﺨﺘﻠﻑ‬ ‫ﺨﺎﺼﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﻟﻬﺎ‬،‫ﺍﻷﺨﺭﻯ‬‫ﺍﻟﺤـﺎﻻﺕ‬ ‫ﺒﻌـﺽ‬ ‫ﻭﻓﻲ‬ ‫ﻤﻥ‬ ‫ﺭﺴﺎﺌل‬ ‫ﺘﺘﻭﻟﺩ‬ICMP‫ﺤﻘﻭ‬ ‫ﻋﻠﻰ‬ ‫ﺘﺤﺘﻭﻱ‬‫ﺃﺸﻬﺭ‬ ‫ﻭﻤﻥ‬ ،‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﻤﻨﻬﺎ‬ ‫ﻴﺴﺘﻔﺎﺩ‬ ‫ﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﻏﻴﺭ‬ ‫ل‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺭﺴﺎﺌل‬ ‫ﻫﺫﻩ‬:[16] [10] .1‫ﺇﻟﻴﻬﺎ‬ ‫ﺍﻟﻭﺼﻭل‬ ‫ﻴﻤﻜﻥ‬ ‫ﻻ‬ ‫ﺍﻟﻭﺠﻬﺔ‬Destination Unreachable ‫ﺍﻟﺸﻜل‬)5(.‫ﺇﻟﻴﻬﺎ‬ ‫ﺍﻟﻭﺼﻭل‬ ‫ﻻﻴﻤﻜﻥ‬ ‫ﺍﻟﻭﺠﻬﺔ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬
  • 7. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٤١ .2‫ﺘﺠﺎﻭﺯ‬‫ﺍﻟﻭﻗﺕ‬Time Exceeded ‫ﺍﻟﺸﻜل‬)6(.‫ﺍﻟﻭﻗﺕ‬ ‫ﺘﺠﺎﻭﺯ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ .3‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬Echo Request ‫ﺍﻟﺸﻜل‬)7(.‫ﺍﻟﺼﺩﻯ‬ ‫ﻁﻠﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ -5‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻘﺘﺭﺡ‬ ‫ﺍﻟﻨﻅﺎﻡ‬ ‫ﺍﻗﺘﺭﺍﺡ‬ ‫ﺘﻡ‬‫ﺴﺭﻴﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﻨﻅﺎﻡ‬)‫ﻤﺸﻔﺭﺓ‬(‫ﺤﻴـﺙ‬ ،‫ﺍﻻﺘـﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﻋﺒﺭ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﻭﺇﺭﺴﺎﻟﻬﺎ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﺴﺘﺨﺩﻡ‬IP‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬Identification‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﻭﻜﺫﻟﻙ‬ ، ‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﻤ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴﺔ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬‫ﺅ‬‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺍﻟﺤﺎﻟﺔ‬ ‫ﺸﺭ‬Urgent Pointer‫ﻭﺒﺭﻭﺘﻭﻜـﻭل‬ ، UDP‫ﻤ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬‫ﺍﻟﻤﺼﺩﺭ‬ ‫ﻨﻔﺫ‬Source Port‫ﺍﻟﺒﺭﺘﻭﻜﻭل‬ ‫ﻭﺃﺨﻴﺭﺍ‬ ،ICMP‫ﻁﻠـﺏ‬ ‫ﺭﺴﺎﻟﺔ‬ ‫ﺒﻨﻴﺔ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﺼﺩﻯ‬Echo Request‫ﺍﻟﺭﺴﺎﻟﺔ‬ ‫ﻭﺤﻘل‬Message.‫ﻭﺍﻟﺸﻜل‬)8(‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻟﻺﺨﻔـﺎﺀ‬ ‫ﺍﻟﺼﻨﺩﻭﻗﻲ‬ ‫ﺍﻟﻤﺨﻁﻁ‬ ‫ﻴﺒﻴﻥ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.‫ﺍﻟﺘـﺸﻔﻴﺭ‬ ‫ﻤﺭﺤﻠـﺔ‬ ‫ﻤـﻥ‬ ‫ﺍﻟﻨﺎﺘﺠﺔ‬ ‫ﺍﻟﻤﺸﻔﺭﺓ‬ ‫ﺍﻟﻨﺼﻴﺔ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺒﺈﺨﻔﺎﺀ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﺠﻬﺔ‬ ‫ﺘﻘﻭﻡ‬ ‫ﺤﻴﺙ‬‫ﺃ‬‫ﻭ‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺤﻠﻴـﺔ‬ ‫ﺸـﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻤﺭﺤﻠﺔ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻨﺎﺘﺠﺔ‬ ‫ﺍﻟﻤﻠﻭﻨﺔ‬ ‫ﺍﻟﺼﻭﺭﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬.[6] ‫ﹰ‬‫ﺎ‬‫ﻨـﺼ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺘﻠﻙ‬ ‫ﺃﻜﺎﻨﺕ‬ ‫ﺴﻭﺍﺀ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﻤﺭﺴﻠﺔ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﻴﺘﻡ‬ ‫ﺍﻟﻤﺴﺘﻘﺒل‬ ‫ﺠﻬﺔ‬ ‫ﻭﻓﻲ‬ ‫ﻤﺸﻔﺭ‬ ‫ﻨﺹ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻴﺔ‬‫ﻤ‬ ‫ﺼﻭﺭﺓ‬ ‫ﺃﻡ‬ ‫ﹰ‬‫ﺍ‬‫ﻤﺸﻔﺭ‬. 1-5‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﺃ‬-‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﺸﺒﻜﺔ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻫﻲ‬ ‫ﺸﺒﻜﺎﺕ‬ ‫ﺜﻼﺙ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺘﺘﻜﻭﻥ‬10.10.0.0‫ﻭ‬150.150.0.0‫ﻭ‬192.168.0.0،‫ﻭﺘﺤﺘﻭﻱ‬ ،‫ﻤﻭﺠﻪ‬ ‫ﻭﺠﻬﺎﺯﻱ‬ ‫ﺤﺎﺴﻭﺏ‬ ‫ﺠﻬﺎﺯﻱ‬ ‫ﻋﻠﻰ‬‫ﻭ‬‫ﺸـﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺘﻲ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺤﺘﻭﻱ‬ ‫ﺤﺎﺴﻭﺏ‬ ‫ﺠﻬﺎﺯ‬ ‫ﻫﻭ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬ ‫ﺍﻟﻤﻭﺠﻪ‬ ‫ﺠﻬﺎﺯ‬ ‫ﺒ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺴﺎﻜﻥ‬ ‫ﺍﻟﺘﻭﺠﻴﻪ‬ ‫ﺍﺴﺘﺨﺩﻡ‬ ‫ﻭﻗﺩ‬‫ﻤﻭﺠﻪ‬ ‫ﻟﻜل‬ ‫ﺍﻟﺘﻭﺠﻴﻪ‬ ‫ﺠﺩﻭل‬ ‫ﻨﺎﺀ‬،‫ﺍﻟﺸﻜل‬ ‫ﻭﻴﺒﻴﻥ‬)10-4(‫ﺍﻟﻤـﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﺒﺭﻨﺎﻤﺞ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬Packet Tracer‫ﺭﺒﻁﻬﺎ‬ ‫ﻗﺒل‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻭﻓﺤﺹ‬ ‫ﻟﺭﺴﻡ‬ ‫ﺍﻟﺒﺭﻨﺎﻤﺞ‬ ‫ﻫﺫﺍ‬ ‫ﻭﺍﺴﺘﺨﺩﻡ‬ ‫ﻓﻴﺯﻴﺎﺌﻴﺎ‬.
  • 8. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٤٢ ‫ﺍﻟﺸﻜل‬)10-4(.‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﻤﺤﻠﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺏ‬-‫ﺍﻹ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﺩﺨﻼﺕ‬:‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬)Network Packets(‫ﻤﺨﻔﻴﺔ‬ ‫ﺒﺼﻭﺭﺓ‬ ‫ﺇﺭﺴﺎﻟﻪ‬ ‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻟﻤﻠﻑ‬ ،. ‫ﺍﻟﻤﺨﺭﺠﺎﺕ‬:‫ﺴﺭﻴﺔ‬ ‫ﺒﻴﺎﻨﺎﺕ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻰ‬‫ﻤ‬‫ﺍﻟ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬. ‫ﺍﻟﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺨﻁﻭﺍﺕ‬: -1‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻋﺒﺭ‬ ‫ﺇﺭﺴﺎﻟﻪ‬ ‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﺍﺴﻡ‬ ‫ﺇﺩﺨﺎل‬. -2‫ﺤﺴﺎ‬‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺏ‬. -3‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬ ‫ﺘﻭﻟﻴﺩ‬. -4‫ﺇﺭﺴﺎل‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺘﻜﻭﻥ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬. -5‫ﺤﻘل‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺤﺸﺭ‬ID‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP. -6‫ﺍﻟﺤﻘل‬ ‫ﻗﻴﻤﺔ‬ ‫ﺘﻐﻴﻴﺭ‬TOS‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP. -7‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺤﺴﺎﺏ‬IPCHECKSUM‫ﻟﺘﺭﻭﻴﺴﺔ‬IP. -8‫ﺍﻟﺘﻐﻴﻴﺭ‬ ‫ﺒﻌﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺇﻟﻰ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺔ‬. -9‫ﺇﺭﺴﺎل‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺘﻜﻭﻥ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬ -10‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬ ‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻤﻥ‬ ‫ﺜﻤﺎﻨﻴﺘﻴﻥ‬ ‫ﻜﺘﻠﺘﻴﻥ‬ ‫ﻗﺭﺍﺀﺓ‬IP, TCP, UDP‫ﻭ‬32‫ﻓﻲ‬ ‫ﺜﻤﺎﻨﻴﺔ‬ ‫ﻜﺘﻠﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺤﺎﻟﺔ‬ICMP. -11‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﻗﻴﻤﺔ‬ ‫ﺤﺴﺎﺏ‬IPCHECKSUM‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬. -12‫ﺍﻟﺸ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺍﻟﺘﻐﻴﻴﺭ‬ ‫ﺒﻌﺩ‬ ‫ﺒﻜﺔ‬‫ﺇﻟﻰ‬‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﻁﺎﻗﺔ‬. -13‫ﺍﺭﺠﻊ‬‫ﺇﻟﻰ‬9‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﻨﺘﻬﺎﺀ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬.
  • 9. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٤٣ -14‫ﺇﻨﻬﺎﺀ‬‫ﺍﻻﺘﺼﺎل‬. -15‫ﺍﻟﻨﻬﺎﻴﺔ‬. ‫ﺝ‬-‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ ‫ﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺍﻟﻤﺩﺨﻼﺕ‬:‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻡ‬)Network Packets(‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻗﻨﺎﺓ‬ ‫ﺃﻱ‬ ‫ﺍﻟﻤﺴﺘﻘﺒﻠﺔ‬. ‫ﺍﻟﻤﺨﺭﺠ‬‫ﺎﺕ‬:‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﻗﻨﺎﺓ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﺴﺘﺭﺠﻌﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬. ‫ﺍﻟﺨﻭﺍﺭﺯﻤﻴﺔ‬ ‫ﺨﻁﻭﺍﺕ‬: .1‫ﻤﻠﻑ‬ ‫ﺍﺴﻡ‬ ‫ﺇﺩﺨﺎل‬‫ﺍﻹﺨﺭﺍﺝ‬. .2‫ﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬. .3‫ﺤﻘل‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬ID‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP. .4‫ﻤﺴﺘﻘﺒﻠﺔ‬ ‫ﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﻗﺭﺍﺀﺓ‬IP. .5‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺤﻘﻭل‬ ‫ﻤﻥ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﺴﺘﺭﺠﺎﻉ‬, ICMPIP, TCP, UDP‫ﻭ‬٣٢. .6‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺭﺠﻌﺔ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺨﺯﻥ‬‫ﺍﻹﺨﺭﺍﺝ‬. .7‫ﺍﻻﺴﺘﺭﺠﺎﻉ‬ ‫ﺒﻌﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺇﺭﺴﺎل‬‫ﺇﻟﻰ‬‫ﺍﻟﺘﺸﻐﻴل‬ ‫ﻨﻅﺎﻡ‬. .8‫ﺍﺭﺠﻊ‬‫ﺇﻟﻰ‬4‫ﺍﻹﺩﺨﺎل‬ ‫ﻤﻠﻑ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺍﻨﺘﻬﺎﺀ‬ ‫ﻋﺩﻡ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻓﻲ‬. .9‫ﺇﻨﻬﺎﺀ‬‫ﺍﻻﺘﺼﺎل‬. .10‫ﺍﻟﻨﻬﺎﻴﺔ‬. 2-5‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﻜﻠﻤﺔ‬ ‫ﺇﺭﺴﺎل‬ ‫ﺘﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻤﺠﺎل‬ ‫ﻓﻲ‬al_mosul‫ﺍﻟﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﻤﺨﻔﻴـﺔ‬ ‫ﺒﺼﻭﺭﺓ‬IP ‫ﻭ‬TCP‫ﻭ‬UDP‫ﻜﻠﻤﺔ‬ ‫ﻭﺇﺭﺴﺎل‬ ،al_mosul‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺘﺸﻔﻴﺭﻫﺎ‬ ‫ﺒﻌﺩ‬IP،‫ﺒﺤﺠـﻡ‬ ‫ﻤﻠﻑ‬ ‫ﺇﺭﺴﺎل‬ ‫ﻭﻜﺫﻟﻙ‬ 256‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ICMP‫ﺒﺭﻨﺎﻤﺞ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺠﻠﺕ‬‫ﺴ‬‫ﻭ‬ ،Ethereal‫ﺒﺭﻨـﺎﻤﺞ‬ ‫ﻭﻫـﻭ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﺤﻠﻴل‬. -1‫ﺍﻹ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺨﻔﺎﺀ‬‫ﺍﻻﻨﺘﺭﻨﺕ‬IP ‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﺍﻟﺘﻌﺭﻴﻑ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬ Identification‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬IP ‫ﺍﻟﺸﻜل‬)10(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬
  • 10. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٤٤ ‫ﺍﻟﺸﻜل‬)11(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﻓﻴﻬ‬ ‫ﻤﺨﻔﻰ‬‫ﺍﻟﺤﺭﻓ‬ ‫ﺎ‬‫ﺎﻥ‬al ‫ﺍﻟﺸﻜل‬)12(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬_m ‫ﺍﻟﺸﻜل‬)13(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬os ‫ﺍﻟﺸﻜل‬)14(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬IP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬ul -2‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻨﻘل‬TCP ‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﺍﻟﻘﻨﺎ‬ ‫ﻋﺒﺭ‬‫ﻤﺅﺸـﺭ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺓ‬ ‫ﺍﻟﻁﺎﺭﺌﺔ‬ ‫ﺍﻟﺤﺎﻟﺔ‬urgent pointer‫ﺍﻟﻨﻘل‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬TCP‫ﻓـﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ، ‫ﺍﻷﺸﻜﺎل‬:
  • 11. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٤٥ ‫ﺍﻟﺸﻜل‬)15(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬al ‫ﺍﻟﺸﻜل‬)16(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬_m ‫ﺍﻟﺸﻜل‬)17(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬os ‫ﺍﻟﺸﻜل‬)18(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬TCP‫ﺍﻟﺤﺭﻓﺎﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬ul -3‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬‫ﺍﻟﻨﻘل‬UDP ‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﺃﺭﺒﻊ‬‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬‫ﻜﻠﻤﺔ‬al_mosul‫ﻤﻨﻔـﺫ‬ ‫ﺭﻗﻡ‬ ‫ﺤﻘل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬ ‫ﺍﻟﻤﺼﺩﺭ‬source port‫ﺒﺭﻭ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬‫ﺍﻷﺸﻜﺎل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ،‫ﺍﻟﻨﻘل‬ ‫ﺘﻭﻜﻭل‬:
  • 12. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٤٦ ‫ﺍﻟﺸﻜل‬)19(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬al ‫ﺍﻟﺸﻜل‬)20(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓﻴﻥ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬_m ‫ﺍﻟﺸﻜل‬)21(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻤﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬os ‫ﺍﻟﺸﻜل‬)22(.‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬UDP‫ﻤ‬‫ﺍﻟﺤﺭﻓ‬ ‫ﻓﻴﻬﺎ‬ ‫ﺨﻔﻰ‬‫ﺎ‬‫ﻥ‬ul -4‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻓﻲ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ICMP ‫ﺤﺠﻤﻪ‬ ‫ﻤﻠﻑ‬ ‫ﻹﺭﺴﺎل‬ ‫ﺤﺯﻡ‬ ‫ﺜﻤﺎﻥ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬256‫ﺍﻟﺭﺴـﺎﻟﺔ‬ ‫ﺤﻘـل‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﺼﻤﻤﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻋﺒﺭ‬ message‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﺭﻭﻴﺴﺔ‬ ‫ﻓﻲ‬ICMP‫ﺍﻷﺸﻜﺎل‬ ‫ﻓﻲ‬ ‫ﻜﻤﺎ‬ ‫ﺍﻹﺭﺴﺎل‬ ‫ﻋﻤﻠﻴﺔ‬ ‫ﺘﻭﻀﻴﺢ‬ ‫ﻭﻴﻤﻜﻥ‬ ،:
  • 13. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٤٧ ‫ﺍﻟﺸﻜل‬)23(.‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺍﻷ‬‫ﻭﻟﻰ‬‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ICMP ‫ﺍﻟﺸﻜل‬)24(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻨﻴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP ‫ﺍﻟﺸﻜل‬)25(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻟﺜﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP ‫ﺍﻟﺸﻜل‬)26(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺭﺍﺒﻌﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP ‫ﺍﻟﺸﻜل‬)27(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺨﺎﻤﺴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP
  • 14. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٤٨ ‫ﺍﻟﺸﻜل‬)28(.‫ﻟﺒ‬ ‫ﺍﻟﺴﺎﺩﺴﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬‫ﺭﻭﺘﻭﻜﻭل‬ICMP ‫ﺍﻟﺸﻜل‬)29(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺴﺎﺒﻌﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP ‫ﺍﻟﺸﻜل‬)30(.‫ﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﺜﺎﻤﻨﺔ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﺭﻭﻴﺴﺔ‬ICMP -6‫ﺍﻻﺴﺘﻨﺘﺎﺠﺎﺕ‬ ‫ﺍﻟﻤﻐﻁـﺎﺓ‬ ‫ﺍﻟﻜﺘﺎﺒـﺔ‬ ‫ﺘﻘﻨﻴـﺔ‬ ‫ﺒﺎﺴـﺘﺨﺩﺍﻡ‬ ‫ﺴﺭﻴﺔ‬ ‫ﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻘﺘﺭﺤﺔ‬ ‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ‫ﺘﻁﺒﻴﻕ‬ ‫ﺨﻼل‬ ‫ﻤﻥ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﻨﺘﺎﺌﺞ‬ ‫ﺨﻼل‬ ‫ﻭﻤﻥ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﻭﺍﻟﻘﻨﻭﺍﺕ‬‫ﺍﻟﺘﻭﺼل‬ ‫ﺘﻡ‬ ‫ﻋﻠﻴﻬﺎ‬ ‫ﺍﻟﺤﺼﻭل‬ ‫ﺘﻡ‬‫ﺇﻟﻰ‬‫ﺍﻻﺴﺘﻨﺘﺎﺠﺎﺕ‬‫ﺍﻵﺘﻴﺔ‬: .1‫ﺇﺠﺭﺍﺀ‬‫ﻭﺍﻟﻤﺴﺘﻠﻡ‬ ‫ﺍﻟﻤﺭﺴل‬ ‫ﻁﺭﻕ‬ ‫ﺒﻴﻥ‬ ‫ﻤﺭﺌﻲ‬ ‫ﻏﻴﺭ‬ ‫ﺍﺘﺼﺎل‬‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬‫ﻓﻲ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻤﺴﺘﻭﻯ‬ ‫ﻤﻥ‬ ‫ﻗﻠل‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺴﺭﻱ‬ ‫ﺍﺘﺼﺎل‬ ‫ﻭﺠﻭﺩ‬. .2‫ﻗﻴﻤ‬ ‫ﺘﻘﻠﻴل‬ ‫ﺒﻌﺩ‬ ‫ﺍﻻﻨﺘﺭﻨﺕ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻟﺘﺭﻭﻴﺴﺔ‬ ‫ﺍﻟﺘﺩﻗﻴﻘﻲ‬ ‫ﺍﻟﻤﺠﻤﻭﻉ‬ ‫ﺤﺴﺎﺏ‬ ‫ﻭﻴﻌﻴﺩ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺤﺯﻤﺔ‬ ‫ﺍﻟﻤﻭﺠﻪ‬ ‫ﻴﺴﺘﻘﺒل‬‫ﺔ‬ TTL‫ﺍﻟﻭﺠﻬﺔ‬ ‫ﻋﻨﻭﺍﻥ‬ ‫ﻴﻔﺤﺹ‬ ‫ﻭﻜﺫﻟﻙ‬ ‫ﺍﻟﺤﺯﻤﺔ‬ ‫ﺘﻬﻤل‬ ‫ﺍﺨﺘﻼﻓﻪ‬ ‫ﺤﺎﻟﺔ‬ ‫ﻭﻓﻲ‬ ،‫ﻭﺍﺤﺩ‬ ‫ﺒﻤﻘﺩﺍﺭ‬،‫ﺒﺙ‬ ‫ﻋﻨﻭﺍﻥ‬ ‫ﻜﺎﻥ‬ ‫ﻓﺎﻥ‬ Broad Cast‫ﺇﺭﺴﺎﻟﻬﺎ‬ ‫ﻴﻤﻨﻊ‬‫ﺇﻟﻰ‬‫ﺸﺒﻜﺔ‬‫ﺃﺨﺭﻯ‬. .3‫ﺃﻅﻬﺭﺕ‬‫ﺍﻟﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﻭﺍﺕ‬ ‫ﺘﺼﻤﻴﻡ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬‫ﺍﻵﺘﻴﺔ‬: ‫ﺃ‬-‫ﺃﻋﻁﻰ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬IP‫ﺠﻴﺩ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﻏﻴﺭ‬ ‫ﻤﻥ‬ ‫ﻭﺼﻭﺭﺓ‬ ‫ﻨﺼﻲ‬ ‫ﻤﻠﻑ‬ ‫ﻹﺨﻔﺎﺀ‬ ‫ﹰ‬‫ﺍ‬‫ﺠﺩ‬ ‫ﺓ‬ ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﻤﺭﻭﺭ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﺘﺄﺜﻴﺭ‬. ‫ﺏ‬-‫ﺃﻋﻁﻰ‬‫ﺒﺭﻭﺘﻭﻜﻭل‬TCP‫ﺠﻴﺩﺓ‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﻷﻨﻪ‬‫ﻤﻭﺜﻭﻗﺎ‬ ‫ﺍﺘﺼﺎﻻ‬ ‫ﻴﻭﻓﺭ‬. ‫ﺝ‬-‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻴﻭﻓﺭ‬UDP‫ﻤﺨﻔﻴﺎ‬ ‫ﺍﺘﺼﺎﻻ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬،‫ﻋﻠﻴـﻪ‬ ‫ﻤﻌﺘﻤﺩ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻻﺘﺼﺎل‬ ‫ﻫﺫﺍ‬ ‫ﻭﻟﻜﻥ‬ ‫ﻷﻥ‬ ‫ﻭﺫﻟﻙ‬‫ﺁﻟﻴﺔ‬‫ﻋﻤل‬ ‫ﺍﺘﺼﺎل‬‫ﺒﻪ‬ ‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻫﺫﺍ‬.
  • 15. ‫ﺍﻟﺸﺒﻜﺔ‬ ‫ﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺎﺕ‬ ٤٩ ‫ﺩ‬-‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻴﻭﻓﺭ‬ICMP‫ﻤﺴﺎﺤﺎﺕ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻘﻨﺎﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻡ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﻤﺴﺎﺤﺎﺕ‬ ‫ﻤﻥ‬ ‫ﺍﻜﺒﺭ‬ ‫ﺍﻟﺘﺸﺨﻴﺹ‬ ‫ﻓﻲ‬ ‫ﺍﺴﺘﺨﺩﺍﻤﻪ‬ ‫ﻟﻜﺜﺭﺓ‬ ‫ﺍﻟﺸﻙ‬ ‫ﻋﻠﻰ‬ ‫ﻴﺒﻌﺙ‬ ‫ﻭﻟﻜﻨﻪ‬ ‫ﺍﻟﺴﺎﺒﻘﺔ‬‫ﺃﺨﻁﺎﺀ‬‫ﺍﻟﺸﺒﻜﺔ‬. ‫ﻴﻤﻜﻥ‬ ‫ﺍﻟﺘﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﺤﺠﻡ‬ ‫ﻓﺎﻥ‬ ‫ﺒﺎﻟﺘﺎﻟﻲ‬‫ﺇﺨﻔﺎﺀﻫﺎ‬‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺤﺯﻡ‬ ‫ﻀﻤﻥ‬‫ﺍﻟﺘـﻲ‬ ‫ﺍﻟﻤﺴﺎﺤﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻴﻌﺘﻤﺩ‬ ‫ﺍﻟﻤﺭﺍﺩ‬ ‫ﺍﻟﻤﻠﻑ‬ ‫ﺤﺠﻡ‬ ‫ﺍﺯﺩﻴﺎﺩ‬ ‫ﻤﻊ‬ ‫ﻓﻴﻬﺎ‬ ‫ﻟﻺﺨﻔﺎﺀ‬ ‫ﺍﻟﻤﻁﻠﻭﺒﺔ‬ ‫ﺍﻟﺤﺯﻡ‬ ‫ﻋﺩﺩ‬ ‫ﻭﻴﺯﺩﺍﺩ‬ ‫ﻟﻺﺨﻔﺎﺀ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭﻻﺕ‬ ‫ﺘﻠﻙ‬ ‫ﺘﻭﻓﺭﻫﺎ‬ ‫ﺇﺨﻔﺎﺀﻩ‬.
  • 16. ‫ﻤ‬‫ﻴﻭﻨ‬ ‫ﻨﺎﺭ‬‫ﺴﻠﻭ‬ ‫ﺒﻴﺒﻭ‬ ‫ﻭﺃﻤﻴﺭﺓ‬ ‫ﻜﺸﻤﻭﻟﺔ‬ ‫ﺱ‬ ٥٠ ‫ﺍﻟﻤﺼﺎﺩﺭ‬ [1]‫ﻋﻼﺀ‬ ‫ﻤﺤﻤﺩ‬ ،‫ﻭﺍﻟﺤﻤﺎﻤﻲ‬ ‫ﺤﺴﻴﻥ‬ ‫ﻋﻼﺀ‬ ،‫ﺍﻟﺤﻤﺎﻤﻲ‬)2008(،"‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺇﺨﻔﺎﺀ‬:‫ﻭﺍﻟﻌﻼﻤـﺔ‬ ‫ﺍﻟﻤﺨﻔﻴﺔ‬ ‫ﺍﻟﻜﺘﺎﺒﺔ‬ ‫ﺍﻟﻤﺎﺌﻴﺔ‬"‫ﺇﺜﺭﺍﺀ‬ ،‫ﺍﻟﺸﺎﺭﻗﺔ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴﻊ‬ ‫ﻟﻠﻨﺸﺭ‬. [2]،‫ﻓﺎﺩﻱ‬ ،‫ﺍﻟﻘﺎﺩﺭ‬ ‫ﻋﺒﺩ‬)2006(،"‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﻭﺍﻟﻨﻅﻡ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﺭﻤﺠﺔ‬ ‫ﺍﺤﺘﺭﻑ‬"،‫ﺃﺯﻤﻨﺔ‬‫ﻋﻤﺎﻥ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴﻊ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺍﻷﺭﺩﻥ‬. [3]،‫ﻋﻤﺎﺭ‬ ،‫ﻋﺭﻴﺎﻥ‬)2003(،"‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺸﺎﻤل‬ ‫ﺍﻟﻤﺭﺠﻊ‬"‫ﺴﻭﺭﻴﺔ‬ ،‫ﺤﻠﺏ‬ ،‫ﻭﺍﻟﻌﻠﻭﻡ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺸﻌﺎﻉ‬ ،. [4]،‫ﻭﻴﻠﻴﻨﺴﻜﻲ‬ ،‫ﻭﻤﺎﺭﺸﺎل‬ ‫ﻜﺎﻨﺩﺍﺱ‬ ،‫ﻟﻴﺩﻥ‬)2000(،"TCP/IP"،‫ﺍﻟﻘـﺎﻫﺭﺓ‬ ،‫ﻭﺍﻟﺘﻭﺯﻴـﻊ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺍﻟﻔﺎﺭﻭﻕ‬ ‫ﺩﺍﺭ‬ ، ‫ﻤﺼﺭ‬. [5]،‫ﺸﻴﺨﻭ‬ ‫ﻤﺤﻤﺩ‬ ،‫ﻤﻌﻤﻭ‬)2005(،"‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﻤﺒﺎﺩﺉ‬TCP/IP"‫ﺴﻭﺭﻴﺔ‬ ،‫ﺤﻠﺏ‬ ،‫ﻭﺍﻟﻌﻠﻭﻡ‬ ‫ﻟﻠﻨﺸﺭ‬ ‫ﺸﻌﺎﻉ‬ ،. [6]،‫ﺒﻴﺒﻭ‬‫ﺃﻤﻴﺭﺓ‬،)2009(،"‫ﺘﻘﻨﻴﺎﺕ‬‫ﺇﺨﻔﺎﺀ‬‫ﺍﻟـﺸﺒﻜﺔ‬ ‫ﻭﺒﺭﻭﺘﻭﻜـﻭﻻﺕ‬ ‫ﺍﻟﻌﺼﺒﻴﺔ‬ ‫ﺍﻟﺸﺒﻜﺎﺕ‬ ‫ﺒﺎﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬"، ‫ﻗ‬ ، ‫ﻤﺎﺠﺴﺘﻴﺭ‬ ‫ﺭﺴﺎﻟﺔ‬‫ﺍﻟﻌﺭﺍﻕ‬ ،‫ﺍﻟﻤﻭﺼل‬ ‫ﺠﺎﻤﻌﺔ‬ ،‫ﻭﺍﻟﺭﻴﺎﻀﻴﺎﺕ‬ ‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻋﻠﻭﻡ‬ ‫ﻜﻠﻴﺔ‬ ،‫ﺍﻟﺤﺎﺴﺒﺎﺕ‬ ‫ﻋﻠﻭﻡ‬ ‫ﺴﻡ‬. [7] Ahsan, Kamran (2002), "Covert channel analysis and data hiding in TCP/IP", Unpublished M. Sc. Thesis, University of Toronto, Canada. [8] Bharti, Vishal and Snigdh, Itu (2008), "Practical Development and Deployment of Covert Communication in IPV4", Birla Institute of Technology, India. [9] Cabuk, Serdar , Brodley, Carla and Shields, Clay (2004), "IP Covert Timing Channels: An Initial Exploration", Washington, USA. [10] Forouzan, Behrouz A., (2003), "TCP/IP: Protocol Suite", McGraw-Hill, USA. [11] Kwecka, Zbigniew, (2006), "Application Layer Covert Channel Analysis and Detection", University for the degree of Bachelor of Science with Honours in Networked Computing, Napier University, Edinburgh. [12] Lampson, Butler W., (1973), "A Note on the Confinement Problem", pp 613- 615. [13] Murdoch, Steven J., (2007), "Covert Channel Vulnerabilities in Anonymity Systems", Unpublished Ph.D. Thesis, University of Cambridge. [14] Pozo, Rubén Rios del, (2007), "Information Hiding in Networks Covert Channels", Skovde University. [15] Siddiqui, Kashif Ali, (2003), "Covert Chanaels in TCP/IP & Protocol Steganography". [16] Smeets, Marc and Koot, Matthijs, (2006), "Covert Channels", Unpuplished M. Sc. Thesis, University of Amsterdam. msmeets,mrkoot}@os3.nl [17] Zander, Sebastian , Armitage, Grenville and Branch, Philip (2006), "Covert Channels in the IP Time To Live Field", Swinburne University of Technology Australia.