Toward network steganography detection
نویسندگان
چکیده
Network steganography is a recently introduced, general term which describes all information hiding methods that may be used to hide secret data in the normal data transmissions of users. While sending encrypted information, enabled by some cryptographic algorithm, protects messages from being captured by unauthorized parties, steganographic techniques enable concealing the fact that a message is being sent, and if not detected, make the sender and receiver “invisible”. Network steganography methods may be viewed as a threat to network security, as they may be used as a tool for confidential information leakage, for example. For this reason, it is important to identify possibilities for covert communication, as knowledge of information hiding procedures may be used to develop countermeasures. To detect existence of hidden data inside the network traffic steganalysis methods are used. Steganalysis tools identify suspected network communication and try to determine whether or not it carries hidden information. If it is possible they should also recover hidden information Steganographic techniques arise and evolve with the development of network protocols and mechanisms, and are expected to be used in secret communication or information sharing. Now, it becomes a hot topic due to the wide spread of information networks, e.g., multimedia services in networks and social networks.
منابع مشابه
MoveSteg: A Method of Network Steganography Detection
This article presents a new method for detecting a source point of time based network steganography MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography s...
متن کاملDetection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملPacket Length Based Steganography Detection in Transport Layer
Network steganography describe methods which are used for transmitting information over network without being detected. Length of packet is used for sending secret data. In this paper, a network steganographic detection scheme has been proposed which can detect the presence of steganographic content by modifying length of UDP datagrams. Proposed detection scheme can detect network steganography...
متن کامل"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of “the moving observer”. We considered three levels of undetectability named: “good”, “bad”, and “ugly”. To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hi...
متن کاملTrends toward real-time network data steganography
Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding da...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Telecommunication Systems
دوره 49 شماره
صفحات -
تاریخ انتشار 2012