Perfect undetectability of network steganography

2016 ◽  
Vol 9 (15) ◽  
pp. 2998-3010 ◽  
Author(s):  
Wojciech Frączek ◽  
Krzysztof Szczypiorski
2012 ◽  
Vol 1 (7) ◽  
pp. 63-65
Author(s):  
Jignesh. S Patel ◽  
◽  
Roshni Patel ◽  
Maitrik Shah

2016 ◽  
Vol 62 (4) ◽  
pp. 343-346 ◽  
Author(s):  
Michał Drzymała ◽  
Krzysztof Szczypiorski ◽  
Marek Łukasz Urbański

Abstract This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.


2019 ◽  
Vol 154 ◽  
pp. 543-548
Author(s):  
D.X. Cho ◽  
D.T.H. Thuong ◽  
N.K. Dung

2015 ◽  
Vol 70 ◽  
pp. 764-768 ◽  
Author(s):  
Amritha Sekhar ◽  
Manoj Kumar G. ◽  
M. Abdul Rahiman

2020 ◽  
Author(s):  
Moses Okello

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography was integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons is presented too.<br>


2015 ◽  
Vol 118 (21) ◽  
pp. 23-26
Author(s):  
Maitrik KShah ◽  
Ankitkumar M. Virparia ◽  
Kamal Sharma

Sign in / Sign up

Export Citation Format

Share Document