Stream Control Transmission Protocol Steganography

@article{Fraczek2010StreamCT,
  title={Stream Control Transmission Protocol Steganography},
  author={Wojciech Fraczek and Wojciech Mazurczyk and Krzysztof Szczypiorski},
  journal={2010 International Conference on Multimedia Information Networking and Security},
  year={2010},
  pages={829-834}
}
Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a… 

Figures and Tables from this paper

Hiding information in a Stream Control Transmission Protocol
A Secure Stop and Wait Communication Protocol for Disturbed Networks
TLDR
The proposed peer to peer protocol is very useful for insecure channels and disturbed networks and the method is a convenient stop and wait protocol which provides unbeatable security and suitable for mobile phones as well.
Analysis of network protocols the ability of concealing the information
  • A. Noskov, F. Jakab
  • Computer Science
    2016 International Conference on Emerging eLearning Technologies and Applications (ICETA)
  • 2016
TLDR
The authors use the mechanisms of transmission and detection of transfers with using comparative evaluation of the fields in the packet with the values that are recommended in the standard protocol.
Analysis of Network Protocols: The Ability of Concealing the Information
  • A. Noskov
  • Computer Science
    Computer and Network Security
  • 2020
TLDR
The authors use the mechanisms of transmission and detection of transfers with using comparative evaluation of the fields in the packet with the values that are recommended in the standard protocol.
Future of Data Hiding: A Walk Through Conventional to Network Steganography
TLDR
In this paper various works recently done in the area of different categories of network security has been discussed and analyzed so as to find scope for future research.
Multilevel Steganography: Improving Hidden Communication in Networks
TLDR
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks, in such a way that one method serves as a carrier for the second one (called the lower-level) in a relationship between two information hiding solutions.
Network Steganography and its Techniques: A Survey
TLDR
This paper is on network steganography depicting all the proposed methods available for the network Steganography along with the process of concealing the secret information in the desired communication protocol.
Secret data communication system using steganography, AES and RSA
TLDR
The paper introduces a new secret data communication system that employs the usage of two state-of-the art cryptographic algorithms (RSA with asymmetric keys and AES with symmetric key) together with steganography to build a robust Steganography-based communication system capable of withstanding multiple types of attacks, detection and reverse engineering.
Computer and Network Security
TLDR
This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications and is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working on cryptography, network security and security and privacy issues in the Internet of Things, and machine learning application in security.
...
...

References

SHOWING 1-10 OF 21 REFERENCES
Steganography of VoIP Streams
TLDR
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
Security Attacks Found Against the Stream Control Transmission Protocol (SCTP) and Current Countermeasures
TLDR
This memo provides information for the Internet community that will provide some useful background information for many of the newest requirements spelled out in the SCTP Specification Errata and Issues and included in RFC 4960.
Stream control transmission protocol (SCTP): a reference guide
TLDR
This book provides useful perspective on design rationale and highlights SCTP's improvements over TCP in the areas of security and reliability, and demonstrates how to take full advantage of the protocol to make IP-based communications more reliable and robust.
Stream Control Transmission Protocol (SCTP) Partial Reliability Extension
TLDR
This memo describes the protocol extensions, which consist of a new parameter for INIT and INIT ACK, and a new FORWARD TSN chunk type, and provides one example of a partially reliable service that can be provided to the upper layer via this mechanism.
A survey of covert channels and countermeasures in computer network protocols
TLDR
A survey of the existing techniques for creating covert channels in widely deployed network and application protocols and an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks are given.
Embedding Covert Channels into TCP/IP
TLDR
By examining TCP/IP specifications and open source implementations, tests to detect the use of naive embedding are developed and reversible transforms that map block cipher output onto TCP ISNs are described, indistinguishable from those generated by Linux and OpenBSD.
Covert Channels in IPv6
TLDR
This paper introduces and analyze 22 different covert channels in the Internet Protocol version 6 (IPv6), and defines three types of active wardens, stateless, stateful, and network-aware, who differ in complexity and ability to block the analyzed covert channels.
Stream Control Transmission Protocol
This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.
Covert Channels in the TCP/IP Protocol Suite
TLDR
This paper attempts to illustrate the weaknesses in the TCP/IP protocol suite in both theoretical and practical examples.
Information hiding-a survey
TLDR
An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
...
...