We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Network Steganography and its Techniques: A Survey

by Namrata Singh, Jayati Bhardwaj, Gunjan Raghav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 2
Year of Publication: 2017
Authors: Namrata Singh, Jayati Bhardwaj, Gunjan Raghav
10.5120/ijca2017915319

Namrata Singh, Jayati Bhardwaj, Gunjan Raghav . Network Steganography and its Techniques: A Survey. International Journal of Computer Applications. 174, 2 ( Sep 2017), 8-14. DOI=10.5120/ijca2017915319

@article{ 10.5120/ijca2017915319,
author = { Namrata Singh, Jayati Bhardwaj, Gunjan Raghav },
title = { Network Steganography and its Techniques: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 2 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number2/28378-2017915319/ },
doi = { 10.5120/ijca2017915319 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:04.780216+05:30
%A Namrata Singh
%A Jayati Bhardwaj
%A Gunjan Raghav
%T Network Steganography and its Techniques: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 2
%P 8-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the ongoing increase of threats and vulnerabilities to our information security, the need for a strong, secure and an effective kind of approach is highly required. An approach that fulfills all these parameters is a byproduct of the trending steganography technique. As there is the availability of various types of cover media, but this paper focuses only on one such media, which is a ‘network’. Using the network as the cover media for hiding the data for transmission of the secret information safely, is one of the smart moves towards the information security. This approach is known as network steganography. Since the intruders try every bit to take the advantage of that secret information, this concept of network steganography provides the concealment of the secret data by using the covert channel which uses the bandwidth of other permissible communication channels for the transmission purpose. This paper is on network steganography depicting all the proposed methods available for the network steganography along with the process of concealing the secret information in the desired communication protocol.

References
  1. Amritha Sekhar, Manoj Kumar G., Prof. (Dr.) M. Abdul Rahiman, A Study on Network Steganography Methods, International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), International Conference on Recent Trends in Computing and Communication (ICRTCC 2015), Cochin College of Engineering & Technology, Vol. 4, Special Issue 1, June 2015.
  2. Network Steganography http://stegano.net/network-steganography.html (last accessed 6 august 2017).
  3. K. Szczypiorski, HICCUPS: Hidden Communication System for Corrupted Networks, In Proc. of: The Tenth International Multi-Conference on Advanced Computer Systems ACS'2003, pp. 31-40, October 22-24, 2003.
  4. W. Mazurczyk and K. Szczypiorski, Steganography of VoIP Streams, In: Robert Meersman and Zahir Tari (Eds.): OTM 2008, Part II - Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of On The Move Federated Conferences and Workshops: The 3rd International Symposium on Information Security (IS'08), November 9-14, 2008, pp. 1001-1018.
  5. B. Jankowski, W. Mazurczyk, K. Szczypiorski, Information Hiding Using Improper Frame Padding - 14th International Telecommunications Network Strategy and Planning Symposium (Networks), 2010.
  6. W. Mazurczyk, M. Smolarczyk, K. Szczypiorski, RSTEG: Retransmission Steganography and Its Detection, In: Soft Computing in 2010, ISSN: 1432-7643 (print version) ISSN: 1433-7479 (electronic version), Journal no. 500 Springer.
  7. W. Fraczek, W. Mazurczyk, K. Szczypiorski, Stream Control Transmission Protocol Steganography, Second International Workshop on Network Steganography (IWNS 2010) co-located with The 2010 International Conference on Multimedia Information Networking and Security (MINES 2010), November 2010.
  8. P. Białczak, W. Mazurczyk, K. Szczypiorski, Sending Hidden Data via Google Suggest, In Proc. of: Third International Workshop on Network Steganography (IWNS 2011) co-located with The 2011 International Conference on Telecommunication Systems, Modeling and Analysis (ICTSM2011), 2011.
  9. W. Mazurczyk, P. Szaga, K. Szczypiorski, Using Transcoding for Hidden Communication in IP Telephony - In: Computing Research Repository (CoRR), November 2011.
  10. Jun O Seo, Sathiamoorthy Manoharan, Aniket Mahanti; network Steganography and Steganalysis- A Concise review; 2nd International Conference on Applied and Theoritical computing and Communication Technology (iCATccT), 2016 IEEE.
  11. Jun O Seo, Sathiamoorthy Manoharan, Aniket Mahanti; A Discussion and Review of Nwtwork Steganography; 14th Intl. Conf. on Dependable Autonomic and Secure Computing, 14th Intl. Conf. on Pervasive Intelligence and Computing, 2nd Intl. Conf. on Bigdata Intelligence and Computing and Cyber Science and Technology Congress, IEEE 2016.
  12. Wojciech Fraczek, Krzysztof Szczypiorski; StegBlocks: ensuring perfect Undetectabilityof Network steganography; 10th conference on Avialability, Reliability and Security,IEEE 2015.
  13. Cachin C; An Information Theoratic model for Steganography, In proc. Of 2nd Intl. Workshop on Information Hiding,1998,pp 306-318.
  14. Osamah Ibrahim Abdullaziz et.al.; Network Packet Payload Parity Based Steganography ; IEEE Conference on Sustainable Utilisation and Development in Engineering and Technology ;2013.
  15. Anand S nair et.al.; Length Based Network Steganography using UDP Protocol;3rd International Conference on Communication Software and Networks, IEEE 2011.
  16. S. Cabuk, C. E. Brodley, C Shields; IP Covert Timing Channels:Design and Detection” In Proceedings of 11th ACM conference on Computer and Communications Security CCS ’04, 2004.
  17. H. Hovhannisyan, K Lu , J Wang; A Novel High Speed IP- timing Covert Channel: Design and evaluation; in Communications (ICC) 2015 IEEE, pp7198-7203.
  18. G Shah, A. Molina, M Blaze; Keyboards and Covert Channels; In proceedings of 15th Conference on Security Symposium, USENIX –SS’06, 2006.
  19. N. Aoki; A Packet Loss Concealment Technique for VoIP using Steganography; Citeseer.
  20. R. Miao, Y. Huang; An approach of Covert Communication based on th Adaptive Steganography Scheme on Voice over IP in Comunications(ICC) IEEE proceedings, 2011.
  21. W. Mazurczyk et.al. ; Using Transcoding for Hidden Communication in IP Telephony, Multimedia Tools and Applications, 2012.
  22. W. Frczek et.al.; Hiding Information in a stream Control Transmission Protocol; Elsevier, 2012.
  23. C H. Rowland ;Covert Channel in the TCP/IP Protocol Suite; Peer reviewed journal on internet, 1997.
  24. D.D Dhobaje et.al.; Steganography by Hiding Data in TCP/IP headers; PVPIT pp 61-65, 2010.
  25. R.M. Goudar et.al.; Secure Data Transmission using Steganography based Data Hiding in TCP/IP; International Conference and Workshop on Emerging Trends in Technology, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Covert Channel IDS Network Steganography OSI Model Protocol.