Towards steganography detection through network traffic visualisation
@article{Mazurczyk2012TowardsSD, title={Towards steganography detection through network traffic visualisation}, author={Wojciech Mazurczyk and Krzysztof Szczypiorski and B. Jankowski}, journal={2012 IV International Congress on Ultra Modern Telecommunications and Control Systems}, year={2012}, pages={947-954} }
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations. The method's feasibility is demonstrated in network steganography environment by presenting steg-tomography methodology and developing the dedicated visualisation tool. To authors' best knowledge this is the first utilization of network…
Figures from this paper
9 Citations
Multilayer Detection of Network Steganography
- Computer Science
- 2020
A new method based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms to provide steganalysis capability for networks with large numbers of devices and connections is presented.
Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
- Computer Science2017 IEEE 42nd Conference on Local Computer Networks (LCN)
- 2017
New inter-protocol hiding techniques which are suitable for real-time services and preliminary results of a novel steganography detection approach which relies on network traffic coloring are introduced.
A New Network Steganographic Method Based on the Transverse Multi-Protocol Collaboration
- Computer ScienceJ. Inf. Hiding Multim. Signal Process.
- 2017
A new network steganographic method called Transverse Multi-Protocol Collaboration Network Steganographic Method (TMPCNSM) is proposed and experiments showed that the great advantage of this method over others are higher steganography bandwidth and more undetectable characteristics due to the complexity of multi-protocol collaborative.
A New DHT: Network Steganography Based on Distributed Coding
- Computer ScienceJ. Inf. Hiding Multim. Signal Process.
- 2018
A new network steganography based on distributed coding (NS-DCM) is proposed in this paper and the experimental results showed that the proposed method has an average bandwidth of 0.998 bits/packet and a better undetectability than some other network Steganography.
The Solution of Key Transmission in Multi-level Network Steganography
- Computer Science2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)
- 2017
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
The Solution of Key Transmission in Multi-level Network Steganography
- Computer Science2018 International Computers, Signals and Systems Conference (ICOMSSC)
- 2018
The experimental results showed that this solution can realize synchronous transmission of the ciphertext and the key, which has a high steganographic bandwidth and a low Steganographic cost, improving the security of network steganography.
A hybrid technique for data embedding over wireless sensor networks based on cover generation through variance
- Computer Science2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
- 2016
Two state of the art steganography techniques are studied which have been applied over speech data and image data respectively, and modified them in order to use them in network Steganography for wireless sensor networks and the hybrid technique performed well and have potential to be applied over wireless Sensor networks for military application.
An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
- Computer ScienceIEEE Access
- 2019
This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host.
References
SHOWING 1-10 OF 41 REFERENCES
Network Based Detection of Passive Covert Channels in TCP/IP
- Computer ScienceThe IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
- 2005
A new method of covert channel detection in initial sequence number (ISN) of TCP/IP is proposed in the paper and tested using experimental data generated by NUSHU covert channel creation tool.
A Survey of Visualization Systems for Network Security
- Computer ScienceIEEE Transactions on Visualization and Computer Graphics
- 2012
A comprehensive review of network security visualization is offered and a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area is provided.
Retransmission steganography and its detection
- Computer ScienceSoft Comput.
- 2011
The paper presents a new steganographic method called RSTEG (retransmission steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms, to not acknowledge a successfully received packet in order to intentionally invoke retransmissions.
An overview of anomaly detection techniques: Existing solutions and latest technological trends
- Computer ScienceComput. Networks
- 2007
Steganography of VoIP Streams
- Computer ScienceOTM Conferences
- 2008
The results of the experiment, that was performed to estimate a total amount of data that can be covertly transferred during typical VoIP conversation phase, regardless of steganalysis, are also included in this paper.
ReLACK: A Reliable VoIP Steganography Approach
- Computer Science2011 Fifth International Conference on Secure Software Integration and Reliability Improvement
- 2011
This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange's Interpolation, and applies a two phase approach on the LACK steganography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity.
Anomaly detection in multidimensional data using negative selection algorithm
- Computer ScienceProceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600)
- 2002
Anomaly detection results with single and multidimensional data sets using the negative selection algorithm developed by Forrest et al. (1994) are reported.
What are suspicious VoIP delays?
- Computer ScienceMultimedia Tools and Applications
- 2010
Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden…
Information Hiding Using Improper frame padding
- Computer Science2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS)
- 2010
Basing on real network traces, it is confirmed that PadSteg is feasible in today's networks and it is estimated what steganographic bandwidth is achievable while limiting the chance of disclosure.
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine
- Computer ScienceICICS
- 2003
The experiments showed that the proposed method could discern the abnormal cases from normal TCP/IP traffic using a Support Vector Machine, which has excellent performance in pattern classification problems.