2004
DOI: 10.1007/978-3-540-30114-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Syntax and Semantics-Preserving Application-Layer Protocol Steganography

Abstract: Abstract. Protocol steganography allows users who wish to communicate secretly to embed information within other messages and network control protocols used by common applications. This form of unobservable communication can be used as means to enhance privacy and anonymity as well as for many other purposes, ranging from entertainment to protected business communication or national defense. In this paper, we describe our approach to application-layer protocol steganography, describing how we can embed message… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(34 citation statements)
references
References 21 publications
0
34
0
Order By: Relevance
“…Alter the number of options placed in an IPv4 packet 2. Modulate the number of options placed in a DHCP packet [Rios et al 2012] [Lucena et al 2004] 6. Extend Simple Mail Transfer Protocol (SMTP) packet headers with additional fields [Getchell 2008] 7.…”
Section: P2 Sequence Patternmentioning
confidence: 99%
See 1 more Smart Citation
“…Alter the number of options placed in an IPv4 packet 2. Modulate the number of options placed in a DHCP packet [Rios et al 2012] [Lucena et al 2004] 6. Extend Simple Mail Transfer Protocol (SMTP) packet headers with additional fields [Getchell 2008] 7.…”
Section: P2 Sequence Patternmentioning
confidence: 99%
“…Utilize the DHCP xid field [Rios et al 2012] 5. Utilize the Secure Shell (SSH) protocol Message Authentication Code (MAC field) [Lucena et al 2004] Notes: As some header elements, such as the TCP ISN, follow a distribution which conforms to a particular operating system or context, their values cannot be considered perfectly random and the placement of "random" values in such elements can lead to different value distributions, which can be detected [Murdoch 2007]. …”
Section: P5 Random Value Patternmentioning
confidence: 99%
“…Lucena et al [67] suggest the MAC field for carrying messages up to 160 bits per SSH PDU. To simulate the randomness of the MAC, the embedded messages are previously compressed and then encrypted (Table 10).…”
Section: Session Initiation Protocol (Sip) and Session Description Prmentioning
confidence: 99%
“…SSH [67] MAC channel can be detected by wrong recomputed MAC value at the receiver end, and other [67] channel can be detected if sender do not care about packet length distribution in the normal SSH traffic.…”
Section: Defence Mechanismsmentioning
confidence: 99%
“…This part of the taxonomy is highly developed, but it is not relevant to steganography. Figure 1 in Lucena et al [8], where Alice and Bob communicate by modifying messages which were sent, and which will ultimately be received, by other parties. However an improper billing is not a typical goal of steganography, so it seems inappropriate to classify stegocommunication as a threat to billing.…”
Section: Extension Of the Threat Taxonomy Of Voipsamentioning
confidence: 99%