Principles and overview of network steganography

@article{Lubacz2014PrinciplesAO,
  title={Principles and overview of network steganography},
  author={J{\'o}zef Lubacz and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={IEEE Communications Magazine},
  year={2014},
  volume={52},
  pages={225-229}
}
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques. 

Figures and Tables from this paper

Review of Network Steganography Techniques
TLDR
The fundamental principles of network steganography that is a relatively new approach of information hiding are discussed, followed by a brief overview of various network Steganography procedures and techniques.
Multilayer Detection of Network Steganography
TLDR
A new method based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms to provide steganalysis capability for networks with large numbers of devices and connections is presented.
Image Processing with Android Steganography
Digital Steganography is a technique that provides confidential communications between two parties via Internet and Mobile Networks. This paper proposes a new solution of digital steganography based
TCP Packet Steganography using SDA Algorithm
This electronic document represents the comparative study of transmission of encrypted data packet using different cryptographic algorithm.
Trends toward real-time network data steganography
TLDR
This paper challenges the security community by introducing an entirely new network dat hiding methodology, which it refers to as real-time network data steganography, and provides the groundwork for this fundamental change of covert network data embedding.
Cover Processing-based Steganographic Model with Improved Security
TLDR
A new model for steganography called Cover Processing-based Steganographic Model (CPSM) is proposed that processes the cover objects and transmits them in a way to improve the security of steganographic objects.
Steganography in data networks based on PDU retransmission
TLDR
The possibility of the TCP protocol mechanism usage in steganography based on intentionally triggered protocol data unit (PDU) retransmission is introduced and how to create a subliminal channel in the network is described.
Future of Data Hiding: A Walk Through Conventional to Network Steganography
TLDR
In this paper various works recently done in the area of different categories of network security has been discussed and analyzed so as to find scope for future research.
...
...

References

SHOWING 1-10 OF 27 REFERENCES
Practical Internet Steganography : Data Hiding in IP
TLDR
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
StegTorrent: A Steganographic Method for the P2P File Sharing Service
TLDR
Experimental results acquired from prototype implementation proved that StegTorrent provides high steganographic bandwidth of up to 270 b/s while introducing little transmission distortion and providing difficult detectability.
Hiding Data in the OSI Network Model
TLDR
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
SkyDe: a Skype-based Steganographic Method
TLDR
SkyDe (Skype Hide), a new steganographic method that utilizes Skype encrypted packets with silence to provide the means for clandestine communication and proves that the method is feasible and offers Steganographic bandwidth as high as 2.8 kbps.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
PadSteg: introducing inter-protocol steganography
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
Steganography in IEEE 802.11 OFDM symbols
TLDR
A performance analysis based on a Markov model, previously introduced and validated by the authors, is provided for the method in relation to the IEEE 802.11 a/g standards, and its results prove that maximum steganographic bandwidth for WiPad is as high as 1.1Mbit/s for data frames and 0.44Mbit /s for acknowledgment frames.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Information hiding-A survey : Identification and protection of multimedia information
TLDR
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Covert Channels in SIP for VoIP signalling
TLDR
Evaluating available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call provides new insights by introducing new techniques.
...
...