• Corpus ID: 220523745

A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration

@article{Xue2017ANN,
  title={A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration},
  author={Pengfei Xue and Jing-Song Hu and Hanlin Liu and RongGui Hu},
  journal={J. Inf. Hiding Multim. Signal Process.},
  year={2017},
  volume={8},
  pages={445-459}
}
In recent years, network steganography has become a new research direction in the field of information hiding. In this paper, a new network steganographic method called Transverse Multi-Protocol Collaboration Network Steganographic Method (TMPCNSM) is proposed. TMPCNSM is realized in the same layer in the TCP/IP protocol stack. Two kinds of collaboration modes to encode the secret information by multi-protocol permutation are proposed and experiments are conducted with three protocols (HTTP… 

Figures and Tables from this paper

Future of Data Hiding: A Walk Through Conventional to Network Steganography
TLDR
In this paper various works recently done in the area of different categories of network security has been discussed and analyzed so as to find scope for future research.
A Multi-Layer Steganographic method Based on Audio Time Domain Segmented and Network Steganography
TLDR
The experimental results showed that the advantage of MLS-ATDSS&NS over others is better trade-off between capacity, anti-detectability and robustness, that means higher steganographic capacity, better anti- Detectionability and stronger robustness.
Data Science and Analytics: 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, Gurugram, India, November 15–16, 2019, Revised Selected Papers, Part II
TLDR
Risk factors for security and techniques which can be implemented to mitigate risks are described and related work done by researchers and new research focus in this area is elaborated.

References

SHOWING 1-10 OF 45 REFERENCES
PadSteg: introducing inter-protocol steganography
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
Practical Data Hiding in TCP/IP
TLDR
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
LACK—a VoIP steganographic method
TLDR
The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’'s impact on quality of voice transmission and its resistance to steganalysis.
Practical Internet Steganography : Data Hiding in IP
TLDR
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
Information Hiding Using Improper frame padding
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
The Research on Information Hiding Based on Command Sequence of FTP Protocol
TLDR
Three characters of covert channels, which are concealment, bandwidth and robustness, are studied and the methods to construct covert channels are also applicable to other internet protocol.
Building Covert Channels over the Packet Reordering Phenomenon
TLDR
This paper proposes using the packet reordering phenomenon as the media to carry a hidden channel and shows promising results show the potential of the proposed approach.
HIDE_DHCP: Covert Communications through Network Configuration Messages
TLDR
This work analyzes a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP), in search of new forms of covert communication, and observes several features that can be effectively exploited for subliminal data transmission.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Cloak: A Ten-Fold Way for Reliable Covert Communications
TLDR
Cloak is a new class of reliable timing channels--which is fundamentally different from other timing channels in several aspects, and is feasible under various network conditions and different round-trip delays.
...
...