Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach

@article{Mazurczyk2018TowardsDI,
  title={Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach},
  author={Wojciech Mazurczyk and Steffen Wendzel and Krzysztof Cabaj},
  journal={Proceedings of the 13th International Conference on Availability, Reliability and Security},
  year={2018}
}
In network information hiding, hiding patterns are used to describe hiding methods and their taxonomy. In this paper, we analyze the current state of hiding patterns and we further improve their taxonomy. In order to more thoroughly characterize and understand data hiding methods applied to communication networks we propose to distinguish between sender-side and receiver-side patterns. Additionally, we show how information hiding patterns can be utilized to conveniently describe the realization… 
Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels
TLDR
This paper performs a systematic experimental evaluation of the error detection and correcting scheme, which is suitable for complex network data hiding approaches, i.e., distributed network covert channels (DNCCs), and proves that the proposed solution guarantees secret communication reliability even when faced with severe networking conditions.
A Revised Taxonomy of Steganography Embedding Patterns
TLDR
This paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general and focuses on embedding hiding patterns and showing how they can be applied to multiple domains of steganography instead of being limited to the network scenario.
A Revised Taxonomy of Steganography Embedding Patterns
TLDR
This paper reviews both the terminology and the taxonomy of hiding patterns as to make them more general and focuses on embedding hiding patterns and showing how they can be applied to multiple domains of steganography instead of being limited to the network scenario.
Assessment of Hidden Channel Attacks: Targetting Modbus/TCP
TLDR
14 protocol-compliant patterns of information hiding based attacks in the context of Industrial Control Systems are shown as well as the necessity of more research in this particular field, especially in terms of further plausible combination of pattern, warden-compliance, detection and mitigation strategies.
Data Hiding Using Code Obfuscation
TLDR
Results confirm that the core idea of the proposed information hiding method is to replace some randomly generated strings being a part of the introduced dead code with the encoded secret message, which can be easily adopted for data hiding, thus countermeasures need to be adjusted accordingly.
Covert Channels in the MQTT-Based Internet of Things
TLDR
This work presents the first comprehensive study of covert channels in a protocol utilizing the publish-subscriber model, i.e., the Message Queuing Telemetry Transport (MQTT) protocol which is widely deployed in Internet of Things (IoT) environments and proves that MQTT-based covert channels are practically feasible and effective.
A Systematic Analysis of Covert Channels in the Network Time Protocol
TLDR
This work presents a systematic in-depth analysis of covert channels by modification for the Network Time Protocol (NTP), and shows in its first assessment that practically undetectable channels can be implemented in NTP, motivating the required further research.
Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study
TLDR
This paper proposes to rely on the hierarchical organisation of frequent sets discovered by the data mining algorithm and use it together with an outlier detection-based traffic classifier to detect network covert channels: both distributed and undistributed.
Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis
TLDR
An overview of state of the art of the text hiding area is presented, and a comparative analysis of recent techniques are provided, especially those focused on marking structural characteristics of digital text message/file to hide secret bits.
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
TLDR
The main contribution of this paper is that the idea of hiding patterns is extended by introducing the concept ofcountermeasure variation, which is the slight modification of a given countermeasure that was designed to detect covert channels of one specific hiding pattern so that theCountermeasure can also detect covert channel that are representing other hiding patterns.
...
1
2
...

References

SHOWING 1-10 OF 27 REFERENCES
Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures
TLDR
A new classification and taxonomy for modern data hiding techniques is introduced and several example applications of information hiding in communication networks are introduced including some recent covert communication techniques in popular Internet services.
Unified Description for Network Information Hiding Methods
TLDR
The first unified description of hiding methods in network steganography is introduced, based on a comprehensive analysis of the existing publications in the domain, to make it easier to categorize, compare and extend.
Hiding Data in the OSI Network Model
TLDR
The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem.
Techniques for Data Hiding
TLDR
This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
PadSteg: introducing inter-protocol steganography
TLDR
Basing on real network traces, it is confirmed that PadSteg is feasible in today’s networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression
TLDR
Results indicate that steganographically modified VAD-activated VoIP streams offer a good trade-off between stealthiness and steganographic bandwidth.
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
TLDR
A framework and a metric are proposed to help evaluating the creativity bound to a given hiding technique to support two sides of the scientific peer review process as both authors and reviewers can use the framework to analyze the novelty and applicability of hiding techniques.
Towards Adaptive Covert Communication System
TLDR
This paper investigates the methods and an algorithm for implementing adaptive covert communication system that works on real-world Internet, capable of using multiple application-level protocols as its communication media and can be implemented as network application, therefore requires no system modifications of communicating nodes.
Detection of Covert Channel Encoding in Network Packet Delays
TLDR
This paper investigates the channel capacity of Internet-based timing channels and proposes a methodology for detecting covert timing channels based on how close a source comes to achieving that channel capacity.
Detecting protocol switching covert channels
  • S. Wendzel, S. Zander
  • Computer Science
    37th Annual IEEE Conference on Local Computer Networks
  • 2012
TLDR
It is shown that the number of packets between network protocol switches and the time between switches can be monitored to detect PSCCs with 98-99% accuracy for bit rates of 4 bits/second or higher.
...
1
2
3
...