• Corpus ID: 2405514

HICCUPS : Hidden Communication System for Corrupted Networks

  title={HICCUPS : Hidden Communication System for Corrupted Networks},
  author={Krzysztof Szczypiorski},
This article presents HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks. The novelty of HICCUPS is: usage of secure telecommunications network armed with cryptographic mechanisms to provide steganographic system and proposal of new protocol with bandwidth allocation based on corrupted frames. All functional parts of the system and possibility of its implementation in existing public… 

Figures from this paper

A performance analysis of HICCUPS—a steganographic system for WLAN
  • K. Szczypiorski
  • Computer Science
    2009 International Conference on Multimedia Information Networking and Security
  • 2009
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
  • S. Grabski, K. Szczypiorski
  • Computer Science
    2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
  • 2013
A detector of some selected hidden channels that are based on IEEE 802.11 Medium Access Control (MAC) sublayer is created to observe shortcomings and strengths of studied steganographic channels.
StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed
Framework for Efficient Secure Steganographic Communication over Network Protocols
This paper presents a framework that offers the protection to the covert data by encrypting it and compresses it for gain in efficiency and is compared with other steganography frameworks.
Hiding Data in VoIP
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
Theoretical analysis and simulation results of the presented steganographic system performance are included, which provides the highest hidden transmission known in the state of the art.
SCONeP: Steganography and Cryptography approach for UDP and ICMP
An implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it is proposed, and two less utilized protocols for data hiding, ICMP and UDP are described.
On the baseband communication performance of physical layer steganography
This paper uses the bit error rate as a function of signal-to-noise ratio, and investigates whether the hidden message is truly steganographic in the sense that it cannot be distinguished from the usual noise in the channel.
On information hiding in retransmissions
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of
Covert Channel for Improving VoIP Security
In this paper a new way of exchanging data for Voice over Internet Protocol (VoIP) service is presented. With use of audio watermarking and network steganography techniques we achieve a covert


Hiding Data in the OSI Network Model
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Practical Data Hiding in TCP/IP
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
Eliminating Steganography in Internet Traffic with Active Wardens
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
New directions in cryptography
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Weaknesses in the Key Scheduling Algorithm of RC4
It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
(Not So) Random Shuffles of RC4
An idealized model of RC4 is proposed and a conservative estimate for the number of bytes that should be discarded in order to be safe is found, which recommends dumping at least 512 bytes.
TCP performance issues over wireless links
The problems arising when the TCP/IP protocol suite is used to provide Internet connectivity over existing and emerging wireless links are discussed, including degraded TCP performance due to mistaking wireless errors for congestion.
Covert Channels in the TCP/IP Protocol Suite
This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.
Emerging public safety wireless communications systems
The Public Safety Wireless Environment -RF Link Overview, Radio-Wave Propagation in Open, In-Street, and In-Building Environments, and Emerging Technologies and Systems - Advancements Supporting Public Safety Needs - Priority Access, Coverage, Security.
The Switch Book: The Complete Guide to LAN Switching Technology
Packed with the most up-to-date and complete information on LAN switches, this book explains how switches and bridges operate, explores implementation and performance issues, and discusses the architecture and data flow through a typical switch.