Lightweight Network Steganography for Distributed Electronic Warfare System Communications

This paper presents the application of a modified implementation of the StegBlocks TCP method as part of the Distributed Electronic Warfare System. The existing system is not equipped with a secure information communication mechanism for transmission between assimilated hosts and from hosts back to the server. The method implemented utilizes network steganography to provide covert data transmission through the network using network packets. The proposed implementation is compared to another implementation of the same method on the aspects of the implementations’ usability, versatility, and applicability. Discussion on how the proposed implementation is more suitable than the alternate implementation is presented. Future proposed improvements to the implementation are also discussed.

[1]  Barbara Hayes-Roth,et al.  A Blackboard Architecture for Control , 1985, Artif. Intell..

[2]  Krzysztof Szczypiorski,et al.  Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication , 2018, 2018 4th International Conference on Frontiers of Signal Processing (ICFSP).

[3]  Ladan Tahvildari,et al.  ReLACK: A Reliable VoIP Steganography Approach , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement.

[4]  Timothy Franz The Cyber Warfare Professional: Realizations for Developing the Next Generation , 2011 .

[5]  Wojciech Mazurczyk,et al.  Principles and overview of network steganography , 2012, IEEE Communications Magazine.

[6]  Wojciech Mazurczyk,et al.  PadSteg: introducing inter-protocol steganography , 2013, Telecommun. Syst..

[7]  Wojciech Mazurczyk,et al.  Steganography in IEEE 802.11 OFDM symbols , 2016, Secur. Commun. Networks.

[8]  Jeremy Straub,et al.  Autonomous Distributed Electronic Warfare System of Systems , 2019, 2019 14th Annual Conference System of Systems Engineering (SoSE).

[9]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[10]  Jeremy Straub Blackboard-Based Electronic Warfare System , 2015, CCS 2015.

[11]  Krzysztof Szczypiorski,et al.  Perfect undetectability of network steganography , 2016, Secur. Commun. Networks.