Principles and overview of network steganography

The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network steganographic methods and techniques.

[1]  Nikita Borisov,et al.  Stegobot: A Covert Social Network Botnet , 2011, Information Hiding.

[2]  Wojciech Mazurczyk,et al.  StegTorrent: A Steganographic Method for the P2P File Sharing Service , 2013, 2013 IEEE Security and Privacy Workshops.

[3]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[4]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[5]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[6]  Wojciech Mazurczyk,et al.  SkyDe: a Skype-based Steganographic Method , 2013, Int. J. Comput. Commun. Control.

[7]  Maarten Van Horenbeeck,et al.  Deception on the network: thinking differently about covert channels , 2006 .

[8]  Deepa Kundur,et al.  Practical Internet Steganography : Data Hiding in IP , 2003 .

[9]  Wojciech Mazurczyk,et al.  Steganography in IEEE 802.11 OFDM symbols , 2016, Secur. Commun. Networks.

[10]  Wojciech Mazurczyk,et al.  PadSteg: introducing inter-protocol steganography , 2013, Telecommun. Syst..

[11]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[12]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[13]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[14]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[15]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[16]  Wojciech Mazurczyk,et al.  Covert Channels in SIP for VoIP signalling , 2008, ArXiv.

[17]  J. Lubacz,et al.  Vice over IP , 2010, IEEE Spectrum.

[18]  Donn B. Parker,et al.  Toward a New Framework for Information Security , 2015 .