Share This Author
Retransmission steganography and its detection
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
Hiding Information in Retransmissions
The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
Multilayer Detection of Network Steganography
A new method based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms to provide steganalysis capability for networks with large numbers of devices and connections is presented.
On information hiding in retransmissions
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of…
Retransmission Steganography Applied
- W. Mazurczyk, Milosz Smolarczyk, K. Szczypiorski
- Computer ScienceInternational Conference on Multimedia…
- 5 July 2010
Experimental results for RSTEG applied to TCP (Transmission Control Protocol) are presented as TCP is the most popular network protocol which ensures reliable data transfer.
Towards model-based anomaly detection in network communication protocols
- Jędrzej Bieniasz, P. Sapiecha, Milosz Smolarczyk, K. Szczypiorski
- Computer Science2nd International Conference on Frontiers of…
- 1 October 2016
This paper considered some significant inputs from the research community to model-based anomaly detection in network communication protocols, and prepared a synthetic brief of the theories and methods for modelling network protocols as state-machines.
Anomaly Detection in Cyclic Communication in OT Protocols
- Milosz Smolarczyk, S. Plamowski, Jakub Pawluk, K. Szczypiorski
- Computer ScienceEnergies
- 18 February 2022
A novel algorithm is presented that combines finite automaton determinism modeling consecutive admissible messages with a time-domain model allowing for random deviations of regularity and an anomaly detection method for cyberattack detection that utilizes stochastic elements, such as time-to-response and time-between-messages.