Hiding out in plaintext : covert messaging with bitwise summations

نویسندگان

  • Michael Charles Perkins
  • Jennifer Davidson
  • Thomas Daniels
چکیده

vi CHAPTER 1. GENERAL INTRODUCTION 1 1.1 Problem Statement 1 1.2 Thesis Organization 1 1.3 Overview of Network Covert Channels 2 1.4 Overview of Information Hiding in TCP/IP 3 1.5 Network Layer 5 1.5.1 Do not Fragment Bit 5 1.5.2 IP Identification Field 6 1.5.3 IP Header Checksum 6 1.5.4 ICMP Data 6 1.6 Transport Layer 7 1.6.1 TCP Time Stamps 7 1.6.2 Sequence and Acknowledgment Fields 9 1.7 Active Wardens 9 1.7.1 Active Wardens – Unstructured Carriers 10 1.7.2 Active Wardens – Structured Carriers 10 1.8 Application Layer 11 1.8.1 Network Drives 12 1.8.2 Word Synonyms 12 1.8.3 DNS Namelookup/Reply 13 1.8.4 SSH 13 1.8.5 Software 15 1.8.6 HTTP Queries 16 1.9 Network Traffic Analysis Metrics 18 CHAPTER 2. HYPOTHESIS 20 2.1 Hypothesis Overview 20 2.2 Bitwise Summation Theory 21 2.2.1 Practical Bandwidth Limitations 23 2.2.2 Effect of Syntax and Semantics 23 2.2.3 Ad-Hoc Interval Method 24 2.2.4 Cryptographic (Blind) Interval Method 24 CHAPTER 3. METHODS 26 3.1 Data Sample 26

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

“ A Novel Approach of Text Steganography based on null spaces ”

Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Digital Steganography algorithms have been developed by using texts, images and audio etc as the cover media. In this approach, a security model is proposed which imposes the concept of secrecy over privacy for text mess...

متن کامل

Plausible Deniability Using Automated Linguistic Stegonagraphy

Information hiding has several applications, one of which is to hide the use of cryptography. The Nicetext [5, 6] system introduced a method for hiding cryptographic information by converting cryptographic strings (random-looking) into “nice text” (namely innocuous looking). The system retains the ability to recover the original ciphertext from the generated text. Nicetext can hide both plainte...

متن کامل

Digital Village Hal Berghel Hiding Data , Forensics , and Anti - Forensics Delving

Data hiding has been with us as long as there have been digital computers and networks. Some readers of this column might be old enough to remember data hiding on tracks above 80 of the ubiquitous 5-1/4inch double-sided, double-density floppy disks in the late 1970s. It was not uncommon to store a program key on the upper regions of the disk for copy protection of PC software. The simplicity of...

متن کامل

Implementation of ISS - IHAS (Information Security System – Information Hiding in Audio Signal) model with reference to proposed e-cipher Method

This paper shows the possibility of exploiting the features of Ecipher method by using both cryptography and Information hiding in Audio signal methods used to send and receive the message in more secured way. Proposed methodology shows that successfully using these Poly substitutions methods (Proposed E-Cipher) for Encode and decodes messages to evolve a new method for Encrypting and decryptin...

متن کامل

On Message Integrity in Symmetric Encryption

Distinct notions of message integrity (authenticity) for block-oriented symmetric encryption are defned by i n tegrity goals to be achieved in the face of diferent t ypes of attacks. These notions are partially ordered by a �dominance" relation. When chosen-plaintext attacks are considered, most integrity goals form a lattice. The lattice is extended when known-plaintext and ciphertext-only att...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005