2016
DOI: 10.1515/eletel-2016-0046
|View full text |Cite
|
Sign up to set email alerts
|

MoveSteg: A Method of Network Steganography Detection

Abstract: Abstract-This article presents a new method for detecting a source point of time based network steganography -MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is under our management.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The studies [3,4,5,6,7,8] presented several studies and proposals for detecting network steganography based on the abnormal behavior analysis technique and the ruleset database. However, noticed that these approaches have two problems [1,2,9,10,11,12]: using the available dataset and focusing on detecting only one steganography technique. Therefore, although these studies brought very high efficiency on experimental datasets, when applied in reality, they did not bring the desired result.…”
Section: A the Problemmentioning
confidence: 99%
“…The studies [3,4,5,6,7,8] presented several studies and proposals for detecting network steganography based on the abnormal behavior analysis technique and the ruleset database. However, noticed that these approaches have two problems [1,2,9,10,11,12]: using the available dataset and focusing on detecting only one steganography technique. Therefore, although these studies brought very high efficiency on experimental datasets, when applied in reality, they did not bring the desired result.…”
Section: A the Problemmentioning
confidence: 99%
“…end for 20: end procedure 21 We assign a cluster number to all air routes according to the minimum distance from centers of clusters. Lastly, we order all air routes by increasing complexity of prediction.…”
Section: Algorithm 1 Point Initializing and Reordering Algorithmmentioning
confidence: 99%
“…However, this difference must be kept to a minimum to make the existence of steganography practically undetectable. For this reason, we evaluated this positional variation between the actual coordinates and modified coordinates, as in a study by Szczypiorski and Tyl [21]. We simulated 1021 air routes 30 times; hence, 30,630 positions were evaluated.…”
Section: Evaluation Of Effectivenessmentioning
confidence: 99%
“…Cybercrime first received serious world attention in 2011 when a cyberattack occurred on the Iranian nuclear reactor facility, Stuxnet (Harianja, Arianto, & Setiawan, 2022). Szczypiorski (2020) stated that cyberspace and security systems are inseparable units. It is not only a place for exchanging information but also a new place to socialize.…”
Section: Introductionmentioning
confidence: 99%