ISSE 2014 Securing Electronic Business Processes 2014
DOI: 10.1007/978-3-658-06708-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats

Abstract: Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlights its potential application for harmful purposes. We discuss the issues related to countering network steganography in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 23 publications
0
17
0
1
Order By: Relevance
“…II. RELATED WORK The application of steganography to design covert wireless communication systems has received some attention over the last few years [13][14][15][16][17]. However, only few works have focused on the design of general-purpose, efficient and undetectable covert wireless communication systems.…”
Section: Introductionmentioning
confidence: 99%
“…II. RELATED WORK The application of steganography to design covert wireless communication systems has received some attention over the last few years [13][14][15][16][17]. However, only few works have focused on the design of general-purpose, efficient and undetectable covert wireless communication systems.…”
Section: Introductionmentioning
confidence: 99%
“…Recent information hiding solutions exploit popular P2P services like Skype, P2P file sharing systems like BitTorrent, search features like Google Suggest, multimedia and real-time services like IP telephony, new network protocols like SCTP, wireless network environments and many more [2].…”
Section: Recent Developmentsmentioning
confidence: 99%
“…Likewise, the term cryptography originates from kryptos − hidden or secret and graphein [1]. Steganography and cryptography can be applied in combination; both are orthogonal [2]. Both the terms have closer meaning.…”
Section: Introductionmentioning
confidence: 99%
“…Although most of the steganographic applications aim at protecting individual privacy, some authors [3], [21], [22] fear that steganography may be used for malicious or dangerous purposes.…”
Section: Introductionmentioning
confidence: 99%