|
THE USE OF NETWORK PROTOCOLS FOR STEGANOGRAPHICAL PURPOSES
|
|
|
L. Krajnik;R. Ambroziak
|
|
|
||
|
|
|
|
1314-2704
|
|
|
||
|
English
|
|
|
17
|
|
|
21
|
|
|
|
|
|
||
|
Network steganography could be used to try to send secret information using computer networks. Transfer of secret information must be carried out in a manner that is hard to detect and compromise covered communication in this way. Only the entities involved in such correspondence should have the right to read the content of message. For other observers, such data exchange should not arise any suspicion. Currently, a lot of interest among scientists is paid to topics of assessment of the suitability of various network protocols for the purpose of carrying out with their help the exchange of classified information. In the literature you can find many items proposing to utilize various network protocols, often supported by the presentation of the application and evaluation of parameters characterizing the proposed method. Among the network protocols described as fit for use steganographical techniques literature represents, among others, as follows:
1. IP - examples described in the literature methods using IP protocol header fields, i.e. IP Identification Field, Do Not Fragment Field (DF); 2. TCP - literature presents several proposals for use TCP initial sequence number (ISN) to hide information; 3. ARP - Address Resolution Protocol - an application PadSteg proposed in [1] uses the ARP request message in steganographical purposes; 4. UDP - although it does not have mechanisms assuring errorless communication can also be the base for the exchange of hidden information; 5. RTP - Real-time Transfer Protocol - is used in most applications that support IP telephony, and generally allows the transfer of audio and video in real time. These protocols, of course, do not exhaust the pool is used for steganographical purposes. Development of new efficient methods of network steganography on the one hand directly expand the capacity to carry out covert exchange of information and the other will affect the development of the field of complementary steganography, or steganalysis. In the era of continuous and ubiquitous exchange of information in a digital representation steganography next to cryptography will be a key tool in the security of data transmission in computer networks. |
|
|
conference
|
|
|
||
|
||
|
17th International Multidisciplinary Scientific GeoConference SGEM 2017
|
|
|
17th International Multidisciplinary Scientific GeoConference SGEM 2017, 29 June - 5 July, 2017
|
|
|
Proceedings Paper
|
|
|
STEF92 Technology
|
|
|
International Multidisciplinary Scientific GeoConference-SGEM
|
|
|
Bulgarian Acad Sci; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Slovak Acad Sci; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; World Acad Sci; European Acad Sci, Arts & Letters; Ac
|
|
|
695-702
|
|
|
29 June - 5 July, 2017
|
|
|
website
|
|
|
cdrom
|
|
|
3017
|
|
|
steganography; information hiding; information concealing
|
|