Unified Description for Network Information Hiding Methods

Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe the embedding of hidden information. We introduce the first unified description of hiding methods in network steganography. Our description method is based on a comprehensive analysis of the existing publications in the domain. When our description method is applied by the research community, future publications will be easier to categorize, compare and extend. Our method can also serve as a basis to evaluate the novelty of hiding methods proposed in the future.

[1]  Scott Craver,et al.  On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.

[2]  Ira S. Moskowitz,et al.  Covert Channels - A Context-Based View , 1996, Information Hiding.

[3]  Robert F. Heizer,et al.  The Background of Thomsen's Three-Age System , 1962 .

[4]  Thomas Rist,et al.  Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[5]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[6]  Stephen Hailes,et al.  Covert channel attacks in pervasive computing , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[7]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[8]  C. Gray Girling,et al.  Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.

[9]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[10]  Steven J. Murdoch,et al.  Covert Channels for Collusion in Online Computer Games , 2004, Information Hiding.

[11]  Sihan Qing,et al.  Optimization of covert channel identification , 2005, Third IEEE International Security in Storage Workshop (SISW'05).

[12]  Sebastian Zander,et al.  Stealthier Inter-packet Timing Covert Channels , 2011, Networking.

[13]  John Aycock,et al.  Improved port knocking with strong authentication , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[14]  Colin Allison,et al.  Covert Channels in Internet Protocols: A Survey , 2005 .

[15]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[16]  Stefan Katzenbeisser,et al.  Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic , 2010, Information Hiding.

[17]  Steffen Wendzel,et al.  Envisioning Smart Building Botnets , 2014, Sicherheit.

[18]  Grzegorz Lewandowski,et al.  Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.

[19]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[20]  Steffen Wendzel,et al.  Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research , 2015, J. Univers. Comput. Sci..

[21]  Vijay Varadharajan,et al.  The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2012, IEEE Transactions on Information Forensics and Security.

[22]  Carlisle M. Adams,et al.  Out-of-Band Covert Channels—A Survey , 2016, ACM Comput. Surv..

[23]  Manfred Wolf Covert Channels in LAN Protocols , 1989, LANSEC.

[24]  Javier López,et al.  Covert communications through network configuration messages , 2013, Comput. Secur..

[26]  Sally Fincher,et al.  Perspectives on HCI patterns: concepts and tools (introducing PLML) , 2003 .

[27]  Aleksandra Mileva,et al.  Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.

[28]  Javier López,et al.  HIDE_DHCP: Covert Communications through Network Configuration Messages , 2012, SEC.

[29]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[30]  Sushil Jajodia,et al.  Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.

[31]  Jana Dittmann,et al.  WLAN steganography: a first practical review , 2006, MM&Sec '06.

[32]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[33]  Carlisle M. Adams,et al.  A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels , 2016, IH&MMSec.

[34]  Wojciech Mazurczyk,et al.  On importance of steganographic cost for network steganography , 2016, Secur. Commun. Networks.

[35]  Zhang Yong,et al.  Entropy based taxonomy of network convert channels , 2009, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS).

[36]  Nikita Borisov,et al.  RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows , 2009, NDSS.

[37]  Georgios Kambourakis,et al.  Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication , 2015, TrustBus.

[38]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[39]  Raheem A. Beyah,et al.  An 802.11 MAC layer covert channel , 2012, Wirel. Commun. Mob. Comput..

[40]  Ira S. Moskowitz,et al.  A pump for rapid, reliable, secure communication , 1993, CCS '93.

[41]  Mike Fisk,et al.  Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.

[42]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[43]  P. Stevens,et al.  History of Taxonomy , 2003 .

[44]  Wojciech Mazurczyk,et al.  Information Hiding as a Challenge for Malware Detection , 2015, IEEE Security & Privacy.

[45]  Jan O. Borchers A pattern approach to interaction design , 2001, DIS '00.

[46]  Sebastian Zander,et al.  Covert channels in multiplayer first person shooter online games , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[47]  Sebastian Zander,et al.  An Improved Clock-skew Measurement Technique for Revealing Hidden Services , 2008, USENIX Security Symposium.

[48]  Sebastian Zander,et al.  Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..

[49]  Craig H. Rowland,et al.  Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.

[50]  Theodore G. Handel,et al.  Hiding Data in the OSI Network Model , 1996, Information Hiding.

[51]  Steve R. White Covert Distributed Processing with Computer Viruses , 1989, CRYPTO.

[52]  George Danezis,et al.  Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).