2017
DOI: 10.22401/jnus.20.4.16
|View full text |Cite
|
Sign up to set email alerts
|

Steganography Using TCP / IP's Sequence Number

Abstract: The exchanging process inside LAN or through the Internet may be exposed to be stolen, altered or damaged by a baleful person who was represented as real threats to transport process and also to information especially if this information was sensitive, important and must be accessed by only authorized person. Therefore this data must be secured against such threats. Steganography is classified as the art of hiding information in a suitable carrier like image, text, audio and video. It can also be applied to ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
2
0
2
Order By: Relevance
“…Security is the most important factor to be considered in the design of information and networking systems that might be subjected to security attacks on WSNs, which are similar to wired networks [15]. WSNs are more susceptible to attacks due to the deployment of SNs in unprotected areas [2].…”
Section: Security Schemes For Wireless Sensor Networkmentioning
confidence: 99%
“…Security is the most important factor to be considered in the design of information and networking systems that might be subjected to security attacks on WSNs, which are similar to wired networks [15]. WSNs are more susceptible to attacks due to the deployment of SNs in unprotected areas [2].…”
Section: Security Schemes For Wireless Sensor Networkmentioning
confidence: 99%
“…Pengurangan ukuran paket juga dilakukan untuk mencegah kemacetan pengiriman dalam transmisi [7]. Pendekatan lain adalah menggunakan header dalam TCP/IP sebagai cover, namun hal ini hanya mampu menampung 4 karakter dalam setip pengiriman komunikasi [9]. Usulan lain adalah dengan melakukan proses streaming data yang dilakukan secara serial dengan menggunakan frameworkcrosslayer [11].…”
Section: Pembahasanunclassified
“…Pengamanan data dalam jalur komunikasi diperkirakan akan terus dilakukan. Hal ini beberapa usulan yang dilaporkan pada penelitian sebelumnya yaitu dengan melakukan penggabungan beberapa teknik kriptografi dan steganografi [4][8], modifikasi algoritma [11], modifikasi ukuran paket [1] [7], meyisipkandalam coverheader [9], penambahan digital signature [12] serta melakukan pengamatan pada lalu lintas data juga masih diperlukan untuk melihat anomali streaming data [13].…”
Section: Pembahasanunclassified
“…The transmission control protocol (TCP) operations is conducted with the use of flags which are very important component of the TCP protocol that must be understood to perform transmission of data over a network and for the network to function properly . Those transmission flags are contained within the seventh field of the TCP header and can be set to either 0 or 1 depending on the situation, which they regulate and determine how connection states are managed as well as the manner in which packet transfers are carried out (Kadhim and Abed, 2017). It is also possible to use flags to control the establishment of connections as well as the closure and termination of connections; in other words, when a flag is turned on, it is referred to as being set; conversely, when a flag is turned off, it is referred to as being unset.…”
Section: Introductionmentioning
confidence: 99%