Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3233261
|View full text |Cite
|
Sign up to set email alerts
|

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(35 citation statements)
references
References 16 publications
0
35
0
Order By: Relevance
“…Recently, covert channels were employed by cyber-attacks, i.e., to permit a covert transmission of malware data. Nevertheless, they could also be applied for legitimate goals, such as transmitting illicit information under Internet censorship [ 14 , 98 , 107 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Recently, covert channels were employed by cyber-attacks, i.e., to permit a covert transmission of malware data. Nevertheless, they could also be applied for legitimate goals, such as transmitting illicit information under Internet censorship [ 14 , 98 , 107 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, in the past, stenographic techniques have failed in TCP because of a different probability distribution to that of the unmodified TCP/IP implementations. According to [11], the TCP/IP header is highly susceptible to steganography. This comprises header fields such as Type of service, IP flags, Fragments offset, IP options, TCP timestamp, Packet order, Packet timing and TCP initial sequence number.…”
Section: Background and Related Workmentioning
confidence: 99%
“…1). The originally proposed taxonomy has been extended a couple of times, with the latest extension being the one of Mazurczyk et al [22]. As can be seen in Fig.…”
Section: Network Information Hiding Patternsmentioning
confidence: 99%
“…Storage channels can either modify protocol fields (such as header bits or padding fields) or payload. If protocol fields are modified then this can be done in two ways, either in a structure modifying manner, i.e., by extending the protocol header with additional fields, or, in a structure preserving way by simply overwriting already existing values in a protocol [22]).…”
Section: Network Information Hiding Patternsmentioning
confidence: 99%
See 1 more Smart Citation