2011 IEEE 3rd International Conference on Communication Software and Networks 2011
DOI: 10.1109/iccsn.2011.6014994
|View full text |Cite
|
Sign up to set email alerts
|

Length based network steganography using UDP protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…In this way, multiple IP IDs correspond to the same symbol (see the example in Figure , left). Total length , protocol , and time to live (TTL) or even the destination address have also been used to hide covert symbols by a similar technique. In , the author proposes some types of covert channels with value to symbol correspondence: setting the IP identification with a value equal to the covert byte multiplied by 256, or the initial sequence number (ISN) with a value equal to the covert byte multiplied by 65536·256.…”
Section: Covert Channelsmentioning
confidence: 99%
“…In this way, multiple IP IDs correspond to the same symbol (see the example in Figure , left). Total length , protocol , and time to live (TTL) or even the destination address have also been used to hide covert symbols by a similar technique. In , the author proposes some types of covert channels with value to symbol correspondence: setting the IP identification with a value equal to the covert byte multiplied by 256, or the initial sequence number (ISN) with a value equal to the covert byte multiplied by 65536·256.…”
Section: Covert Channelsmentioning
confidence: 99%
“…Other transport layer protocols, such as UDP, can also be subjects of network steganography. Such a method has been presented in [ 31 ]—the covert data is embedded in the length of UDP datagram—and authors claim to achieve 456 of bandwidth of the covert channel established with that method.…”
Section: Related Workmentioning
confidence: 99%
“…Before the Smart Config, similar solutions have already been presented. A network-based steganography approach, based on the length-field of UDP packets, has been proposed in [21]. More advanced and detection-proof techniques are presented in [17,24,28,30].…”
Section: Related Workmentioning
confidence: 99%