2016
DOI: 10.5121/ijnsa.2016.8201
|View full text |Cite
|
Sign up to set email alerts
|

Trends Toward Real-Time Network Data Steganography

Abstract: Network steganography has been a well-known covert data channeling method for over three decades.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The payoff for a data thief willing to ignore the implementation difficulty is the degree of detection resistance demonstrated by a timing channel. As previously mentioned, a timing channel does not make any physical alterations to packet header values [38]. Much like a sequence channel, the assailant need only alter the transmission pattern to achieve a covert communication channel that is extremely hard to detect unless there are advanced controls in place to analyze the statistical anomalies in the arrival times of network packets [39].…”
Section: Timing Channel Data Representationmentioning
confidence: 99%
“…The payoff for a data thief willing to ignore the implementation difficulty is the degree of detection resistance demonstrated by a timing channel. As previously mentioned, a timing channel does not make any physical alterations to packet header values [38]. Much like a sequence channel, the assailant need only alter the transmission pattern to achieve a covert communication channel that is extremely hard to detect unless there are advanced controls in place to analyze the statistical anomalies in the arrival times of network packets [39].…”
Section: Timing Channel Data Representationmentioning
confidence: 99%
“…Most generic methods fall into two subcategories that characterize their approach: statistical or machine learning. The studies [3,4,5,6,7,8] presented several studies and proposals for detecting network steganography based on the abnormal behavior analysis technique and the ruleset database. However, noticed that these approaches have two problems [1,2,9,10,11,12]: using the available dataset and focusing on detecting only one steganography technique.…”
Section: A the Problemmentioning
confidence: 99%
“…Data-at-rest refers to the data stored at an endpoint (such as a computer or mobile device) [14], where steganography predominantly involves the manipulation of static multimedia files by the user [15]. When a system is infiltrated, these users can either be internal (authorised user) or external (unauthorised user) and leak sensitive/confidential data.…”
Section: Data-at-restmentioning
confidence: 99%