StegTorrent: A Steganographic Method for the P2P File Sharing Service

@article{Kopiczko2013StegTorrentAS,
  title={StegTorrent: A Steganographic Method for the P2P File Sharing Service},
  author={Pawel Kopiczko and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={2013 IEEE Security and Privacy Workshops},
  year={2013},
  pages={151-157}
}
The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic methods that modify the packets' order it does not require any synchronization. Experimental results acquired from prototype implementation proved that it provides high steganographic bandwidth of up to 270 b/s while introducing little transmission… 

Figures and Tables from this paper

A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent
TLDR
The experimental results show that the proposed scheme can resist statistical-based detection effectively and outperform the existing method by obtaining a lower degree of detection rate under machine learning-based steganalysis.
Stegtorrent using De-Clustering of Data
TLDR
Stegtorrent using de-clustering of data is implemented, which is a new network steganographic method for file transfer service, and takes the advantages of low cost data modification and data recovery.
XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication
TLDR
This paper proposes XTRA—a framework for covert communication using the standard bit-torrent protocol with a robust handshake process for authentication among covert peers with validated performance and analyzed the robustness of XTRA to popular security attacks.
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
TLDR
The issues related to countering network steganography in practice are discussed, an outlook on further research directions and problems are provided and its potential application for harmful purposes is highlighted.
Development Trends in Steganography
TLDR
This paper presents the evolution of the hidden data carrier from the ancient times till the present day and pinpoints the observed development trends, with special emphasis on network steganography.
Distributed data hiding in multi-cloud storage environment
TLDR
This work proposes a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction, and the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties.
SURREAL: SecURe coveRt peEr communicAtion over BitTorrent protocoL
TLDR
In SURREAL, the standard handshake is extended to a 6-step authenticated covert handshake to provide peer authentication service and robust peer anonymity with one way functions and SURREL’s security robustness to potential attacks is validated.
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss
TLDR
Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint and is proposed -- a framework for steganography employing smartphones.
Principles and overview of network steganography
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of
...
...

References

SHOWING 1-10 OF 21 REFERENCES
A Steganography Scheme in P2P Network
TLDR
A steganography scheme for torrent files is proposed, in which two approaches, namely Letter Case Change (LCC) and Field Reusage (FR), are adopted to produce stego-torrent.
Mnemosyne: Peer-to-Peer Steganographic Storage
TLDR
Mnemosyne provides a high level of privacy and plausible deniability by using a large amount of shared distributed storage to hide data by using secure hashing, and loss codes used for resiliency.
Retransmission steganography and its detection
TLDR
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
VoIP steganography and its Detection—A survey
TLDR
This article is a first survey of the existing Voice over IP (VoIP) steganography methods and their countermeasures.
Practical Internet Steganography : Data Hiding in IP
TLDR
This paper investigates practical techniques and uses of Internet steganography and facilitates the interaction of fundamental steganographic principles with the existing network security environment to more generally bridge the areas of data hiding, network protocols and security.
Introducing P2P architecture in adaptive covert communication system
TLDR
This paper investigates the methods and an algorithm for implementing adaptive covert communication system that works on real-world Internet, capable of using multiple application-level protocols as its communication media and can be implemented as network application, therefore requires no system modifications of communicating nodes.
Hidden communication in P2P networks Steganographic handshake and broadcast
TLDR
This work considers the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an authority that monitors the network and proposes distributed and efficient algorithms that transmit hidden information by varying the block request sequence meaningfully.
The Steganographic File System
Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible
Steganographic Communication in Ordered Channels
TLDR
The natural information-theoretic game between the channel processes and the jamming process is defined and the existence of a Nash equilibrium for the mutual information rate is proved and the number of distance bounded permutations is characterized by providing the asymptotically optimal bound.
IP covert timing channels: design and detection
TLDR
It is shown that the regularity of a timing channel can be used to differentiate it from other traffic and present two methods of doing so and measures of their efficiency.
...
...