2013 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (CSUDET) 2013
DOI: 10.1109/csudet.2013.6670985
|View full text |Cite
|
Sign up to set email alerts
|

Network packet payload parity based steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Ultimately, the author concludes that this technique can easily circumvent numerous flow control mechanisms. Abdullaziz [29], in his research, presents a novel approach to steganography using network packet payloads and the concept of payload parity. The study explores the feasibility and effectiveness of this steganographic technique, highlighting its potential applications and implications for network security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Ultimately, the author concludes that this technique can easily circumvent numerous flow control mechanisms. Abdullaziz [29], in his research, presents a novel approach to steganography using network packet payloads and the concept of payload parity. The study explores the feasibility and effectiveness of this steganographic technique, highlighting its potential applications and implications for network security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Abdullaziz et al [25] proposed a covert channel based on network packet length. One packet can carry 1 bit of a covert message.…”
Section: Overviewmentioning
confidence: 99%
“…However, this covert channel is based on using the data payload as a carrier of a secret message and it is considered more complicated [25]. In 2013, Abdullaziz et al took a different way by developing two packet length-based covert channels that did not depend on utilizing a shared secret key as previous techniques did [26]. Their covert channels introduce covert traffic that looks very closely like normal traffic, which increases the resistance against detection methods.…”
Section: Related Workmentioning
confidence: 99%
“…This section introduces and describes our proposed approach, which is expected to resolve the packet lengthbased covert channel developed in one study by Abdullaziz et al [26]. For demonstration, this section starts with an illustration of constructing a covert channel that will be used to evaluate our proposed approach since, to our knowledge, to this end, there is no available public dataset for this covert channel.…”
Section: The Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation