A performance analysis of HICCUPS—a steganographic system for WLAN

@article{Szczypiorski2009APA,
  title={A performance analysis of HICCUPS—a steganographic system for WLAN},
  author={Krzysztof Szczypiorski},
  journal={Telecommunication Systems},
  year={2009},
  volume={49},
  pages={255-259}
}
  • K. Szczypiorski
  • Published 23 June 2009
  • Computer Science
  • Telecommunication Systems
The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost. 
Packet Length Based Steganography Detection in Transport Layer
TLDR
A proposed detection scheme has been proposed which can detect the presence of steganographic content by modifying length of UDP datagrams based on packet length with efficient accuracy.
Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks
  • D. MartinsH. Guyennet
  • Computer Science
    2010 International Conference on Multimedia Information Networking and Security
  • 2010
TLDR
It is shown that this solution can be an energy-efficient way with a good latency to hide data in a wireless sensor network by using steganography, specifically by hiding data in the MAC layer of the 802.15.4 protocol.
Detection of Packet Length Based Network Steganography
TLDR
Experimental results show that proposed detection scheme can detect packet length based network steganography with considerable accuracy.
Length based network steganography using UDP protocol
TLDR
The steganographic security of an existing network length based embedding algorithm has been analyzed and a new scheme has been proposed to overcome the limitation of the existing scheme.
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named:
Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers
TLDR
This paper attempts to propose a novel steganographic scheme which uses the length of the TCP segments to transfer secret information and shows that this scheme is better than other existing schemes based on adjusting thelength of packets.
Attacks with Steganography in PHY and MAC Layers of 802.15.4 Protocol
  • D. MartinsH. Guyennet
  • Computer Science
    2010 Fifth International Conference on Systems and Networks Communications
  • 2010
TLDR
It is shown in this article that there is a threat in wireless sensor networks by using the 802.15.4 protocol, and it is possible to hide data in PHY and MAC layers with steganographic techniques.
Detection of TCP covert channel based on Markov model
TLDR
The detection method based on MAP is proposed to detect the covert communication hidden in TCP flows under various applications such as HTTP, FTP, TELNET, SSH and SMTP and experiments show that the proposed algorithm achieves better detection performance than the existing methods.
Using a novel blending method over multiple network connections for secure communication
TLDR
A novel blending technique that is capable of using as carriers the payload fields of multiple connections including audio, video, and voice over IP (VoIP) streams and evaluates the blending covert method with user datagram protocol (UDP) connections during two network loads.
Detecting JitterBug covert timing channel with sparse embedding
TLDR
A new method to detect JitterBug covert timing channel with sparse embedding is proposed, in which the timing intervals are first modeled in histogram statistics, and then the Kolmogorov–Smirnov statistic is used for detection.
...
...

References

SHOWING 1-8 OF 8 REFERENCES
HICCUPS : Hidden Communication System for Corrupted Networks
TLDR
All functional parts of the HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks, are discussed.
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks
TLDR
The saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks is presented based on the Markov model previously introduced and validated by the authors in Szczypiorski and Lubacz.
Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
  • Saturation Throughput Analysis of IEEE 802ERP-OFDM) Networks. Telecommunication Systems: Modelling, Analysis, Design and Management
  • 2008
Performance analysis of IEEE 802.11 DCF networks
TLDR
An analytical saturation throughput model of IEEE 802.11 DCF (distributed coordination function) with basic access in ad hoc mode is presented, showing that taking into account freezing of the backoff timer when a station senses busy channel is important in modeling saturation throughput.
Steganography in Wireless Local Area Networks
  • PhD thesis (in Polish),
  • 2006
Performance Evaluation of IEEE 802.11 DCF Networks
TLDR
A new analytical saturation throughput model of IEEE 802.11 DCF (Distributed Coordination Function) with basic access in ad-hoc mode is presented, which takes into account freezing of the backoff timer when a station senses a busy channel.
Performance Analysis of IEEE 802.11 DCF Networks. Journal of Zhejiang University - Science A, Zhejiang University Press, co-published with Springer-Verlag GmbH
  • 2008