HICCUPS : Hidden Communication System for Corrupted Networks
@inproceedings{Szczypiorski2003HICCUPSH, title={HICCUPS : Hidden Communication System for Corrupted Networks}, author={Krzysztof Szczypiorski}, year={2003} }
This article presents HICCUPS (HIdden Communication system for CorrUPted networkS), a steganographic system dedicated to shared medium networks including wireless local area networks. The novelty of HICCUPS is: usage of secure telecommunications network armed with cryptographic mechanisms to provide steganographic system and proposal of new protocol with bandwidth allocation based on corrupted frames. All functional parts of the system and possibility of its implementation in existing public…
88 Citations
A performance analysis of HICCUPS—a steganographic system for WLAN
- Computer Science2009 International Conference on Multimedia Information Networking and Security
- 2009
The analysis relies on the original CSMA/CA 802.11 Markov chain-based model and proves that the HICCUPS is the efficient steganographic method with the reasonable cost.
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
- Computer Science2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
- 2013
A detector of some selected hidden channels that are based on IEEE 802.11 Medium Access Control (MAC) sublayer is created to observe shortcomings and strengths of studied steganographic channels.
StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks
- Computer Science, BusinessSensors
- 2021
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed…
Framework for Efficient Secure Steganographic Communication over Network Protocols
- Computer Science
- 2014
This paper presents a framework that offers the protection to the covert data by encrypting it and compresses it for gain in efficiency and is compared with other steganography frameworks.
Hiding Data in VoIP
- Computer Science
- 2008
A classification of network steganography methods is proposed, which enables manipulating certain properties of the communications medium in an unexpected, unconventional, or unforeseen way to hide secret data in users' normal data transmissions.
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
- Business2013 IEEE Security and Privacy Workshops
- 2013
Theoretical analysis and simulation results of the presented steganographic system performance are included, which provides the highest hidden transmission known in the state of the art.
SCONeP: Steganography and Cryptography approach for UDP and ICMP
- Computer Science2011 RoEduNet International Conference 10th Edition: Networking in Education and Research
- 2011
An implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it is proposed, and two less utilized protocols for data hiding, ICMP and UDP are described.
On the baseband communication performance of physical layer steganography
- Computer Science2011 45th Annual Conference on Information Sciences and Systems
- 2011
This paper uses the bit error rate as a function of signal-to-noise ratio, and investigates whether the hidden message is truly steganographic in the sense that it cannot be distinguished from the usual noise in the channel.
On information hiding in retransmissions
- Computer ScienceTelecommun. Syst.
- 2013
The paper presents an idea and experimental results for RSTEG (Retransmission Steganography), which is an intra-protocol hybrid network steganography method. It is intended for a broad class of…
Covert Channel for Improving VoIP Security
- Computer ScienceAdvances in Information Processing and Protection
- 2007
In this paper a new way of exchanging data for Voice over Internet Protocol (VoIP) service is presented. With use of audio watermarking and network steganography techniques we achieve a covert…
References
SHOWING 1-10 OF 18 REFERENCES
Hiding Data in the OSI Network Model
- Computer ScienceInformation Hiding
- 1996
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Practical Data Hiding in TCP/IP
- Computer Science
- 2002
By passing supplementary information through IPv4 headers it is demonstrated how security mechanisms can be enhanced in routers, firewalls, and for services such as authentication, audit and logging without considerable additions to software or hardware.
Eliminating Steganography in Internet Traffic with Active Wardens
- Computer ScienceInformation Hiding
- 2002
This paper examines the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall, and introduces the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications.
New directions in cryptography
- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1976
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Weaknesses in the Key Scheduling Algorithm of RC4
- Computer Science, MathematicsSelected Areas in Cryptography
- 2001
It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
(Not So) Random Shuffles of RC4
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2002
An idealized model of RC4 is proposed and a conservative estimate for the number of bytes that should be discarded in order to be safe is found, which recommends dumping at least 512 bytes.
TCP performance issues over wireless links
- Computer Science, BusinessIEEE Commun. Mag.
- 2001
The problems arising when the TCP/IP protocol suite is used to provide Internet connectivity over existing and emerging wireless links are discussed, including degraded TCP performance due to mistaking wireless errors for congestion.
Covert Channels in the TCP/IP Protocol Suite
- Computer ScienceFirst Monday
- 1997
This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.
Emerging public safety wireless communications systems
- Business, Computer Science
- 2002
The Public Safety Wireless Environment -RF Link Overview, Radio-Wave Propagation in Open, In-Street, and In-Building Environments, and Emerging Technologies and Systems - Advancements Supporting Public Safety Needs - Priority Access, Coverage, Security.
The Switch Book: The Complete Guide to LAN Switching Technology
- Computer Science
- 2000
Packed with the most up-to-date and complete information on LAN switches, this book explains how switches and bridges operate, explores implementation and performance issues, and discusses the architecture and data flow through a typical switch.