First Asia International Conference on Modelling &Amp; Simulation (AMS'07) 2007
DOI: 10.1109/ams.2007.80
|View full text |Cite
|
Sign up to set email alerts
|

Practical Protocol Steganography: Hiding Data in IP Header

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…In , the least two significant bits of the type of service – normally unused – mark different covert symbols.In some cases, only one field value maps a covert symbol (Figure , right). For instance, in , where the Don't Fragment bit of the IP header is used to clandestinely send ‘0’ or ‘1’. Similarly, in , the existence or lack of the checksum – optional for UDP packets – encodes the secret binary data. Value ranges as symbols refers to a special case of correspondence where covert symbols are ________ 0 * Depending on the locations of the warden, the covert channel sender and the covert channel receiver, the class assigned to source and destination addresses can be equally tied , regular or free .…”
Section: Covert Channelsmentioning
confidence: 99%
See 3 more Smart Citations
“…In , the least two significant bits of the type of service – normally unused – mark different covert symbols.In some cases, only one field value maps a covert symbol (Figure , right). For instance, in , where the Don't Fragment bit of the IP header is used to clandestinely send ‘0’ or ‘1’. Similarly, in , the existence or lack of the checksum – optional for UDP packets – encodes the secret binary data. Value ranges as symbols refers to a special case of correspondence where covert symbols are ________ 0 * Depending on the locations of the warden, the covert channel sender and the covert channel receiver, the class assigned to source and destination addresses can be equally tied , regular or free .…”
Section: Covert Channelsmentioning
confidence: 99%
“…In some cases, only one field value maps a covert symbol (Figure , right). For instance, in , where the Don't Fragment bit of the IP header is used to clandestinely send ‘0’ or ‘1’. Similarly, in , the existence or lack of the checksum – optional for UDP packets – encodes the secret binary data.…”
Section: Covert Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…This research specifically deals with data hiding possibilities in the IPv4 header (Xu et al, 2007). Scenarios are discussed that make use of flags and identification fields of the header (Xu et al, 2007). The layered architecture requires the IP datagram to encapsulate data received from the transport layer.…”
Section: Ipv4 Header Considerationmentioning
confidence: 99%