Article

Article title APPLICATION OF NETWORK STEGANOGRAPHY FOR PROTECTION OF THE DATA TRANSFERRED OVER THE INTERNET
Authors O.Yu. Peskova, Yu.G. Khalaburda
Section SECTION IV. METHODS AND CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 12, 2012 @en
Index UDC 81.93.29
DOI
Abstract In paper the basic concepts of a network steganography are presented, classification is given and base methods of a network steganography are considered. The most detailed analyzes methods of modification of header fields, methods, SCTP-steganography, and hybrid methods. The comparative table of characteristics of the methods is provided. We propose the combined method of modifying of the fields IP and TCP headers which doesn"t require synchronization on time of participants of an exchange of the hidden messages, and is characterized by low cost of a steganography. This paper presents the advantages, disadvantages and limitations of the proposed method.

Download PDF

Keywords Network steganography; cryptography.
References 1. Wojciech Mazurczyk, Paweł Szaga, Krzysztof Szczypiorski. Retransmission steganography and its detection. – Электронный журнал [Электронный ресурс]. – Режим доступа:
http://cygnus.tele.pw.edu.pl /~wmazurczyk/art/RSTEG.pdf cвободный
2. Mazurczyk W., Szczypiorski K. Steganography of VoIP streams.:электронный журнал [Электронный ресурс]. – In: MeersmanR, TariZ (eds) Springer-Verlag, 2009. – Режим досту-
па:http://home.elka.pw.edu.pl/~wmazurcz/moja/art/OTM_StegVoIP_2008.pdf, свободный.
3. Craig H. Rowland.Covert Channels in the TCP/IP Protocol Suite. – First Monday. – 1997. – Vol. 2, № 5: Электронный журнал [Электронный ресурс]. Режим доступа:
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/528/449, свободный.
4. Enrique Cauich, Roberto Gуmez, Ryouske Watanabe. Data Hiding in Identification and Offset IP fields. Электронный журнал[Электронный ресурс]. – California University at Irwing,
Computer Science and Engineering 204B University of California, Irvine, CA 92717 USA. – Режим доступа: http://www.sciweavers.org/read/data-hiding-in-identification-and-offset-ip-fields-124683, свободный.
5. Wojciech Mazurczyk, Paweł Szaga, Krzysztof Szczypiorski. Using Transcoding for Hidden Communication in IP Telephony.-электронное пособие [Электронный ресурс]. – Warsaw
University of Technology, Institute of Telecommunications. 2011. – Режим доступа: http://arxiv.org/pdf/1111.1250v1.pdf, свободный.
6. Stewart R. Ed. Stream Control Transmission Protocol. – RFC 4960: Электронный документ [Электронный ресурс]. – Request for Comments: 4960, 2007. – Режим доступа:
http://tools.ietf.org/html/rfc4960, свободный.
7. Frączek W., Mazurczyk W., Szczypiorski K. Stream Control Transmission Protocol Steganography. – Электронное пособие [Электронный ресурс]. – Warsaw University of Technology,
Institute of Telecommunications. 2010. – Режим доступа: http://arxiv.org/abs/1006.0247, свободный.
8. Szczypiorski K. HICCUPS: Hidden Communication System for Corrupted Networks. – Электронный доклад [Электронный ресурс]. – Międzyzdroje, Poland 2003. – Режим доступа:
http://krzysiek.tele.pw.edu.pl/pdf/acs2003-hiccups.pdf, свободный.

Comments are closed.