Hiding Information in a Stream Control Transmission Protocol

نویسندگان

  • Wojciech Fraczek
  • Wojciech Mazurczyk
  • Krzysztof Szczypiorski
چکیده

The STCP (Stream Control Transmission Protocol) is a candidate for a new transport layer protocol that may replace the TCP (Transmission Control Protocol) and the UDP (User Datagram Protocol) protocols in future IP networks. Currently, the SCTP is implemented in, or can be added to, many popular operating systems (Windows, BSD, Linux, HP-UX or Sun Solaris). This paper identifies and presents the most likely ‘‘places’’ where hidden information can be exchanged using an SCTP. The paper focuses mostly on proposing new steganographic methods that can be applied to an SCTP and that can utilise new, characteristic SCTP features, such as multi-homing and multi-streaming. Moreover, for each method, the countermeasure is covered. When used with malicious intent, a method may pose a threat to network security. Knowledge about potential SCTP steganographic methods may be used as a supplement to RFC5062, which describes security attacks in an SCTP protocol. Presented in this paper is a complete analysis of information hiding in an SCTP, and this analysis can be treated as a ‘‘guide’’ when developing steganalysis (detection) tools. 2011 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stream Control Transmission Protocol Applicability Statement

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes the applicability of the Stream Control Transmission Protocol (SCTP). It also contrasts SCTP with the two dominant transport protocols, User Datagram Protocol (UDP) & Transmission Control Pro...

متن کامل

Stream Control Transmission Protocol

Stream Control Transmission Protocol Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abst...

متن کامل

Medical Image Protection by Using Cryptography Data-Hiding and Steganography

This paper presents protecting the transmission of medical images. The presented algorithms will be applied to images.This work presents a new method that combines image cryptography, data hiding and Steganography technique for denoised and safe image transmission purpose. In This method we encrypt the original image with stream cipher algorithm then embed the encrypted image with patient infor...

متن کامل

Enhanced Data Security Transmission of H.264/AVC Video Stream

For the purpose of highly secure data transmission and privacy, sometime there is need of storage and encryption of digital video.During the encryption of video, the data hiding can be performed. In this paper proposed scheme is the secure data transmission with directly hiding data in the encrypted version of H.264/AVC videos is presented, which includes three parts are H.264/AVC video encrypt...

متن کامل

Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-rand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2012