StegTorrent: A Steganographic Method for the P2P File Sharing Service

The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic methods that modify the packets' order it does not require any synchronization. Experimental results acquired from prototype implementation proved that it provides high steganographic bandwidth of up to 270 b/s while introducing little transmission distortion and providing difficult detectability.

[1]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[2]  Janardhan R. Iyengar,et al.  Low Extra Delay Background Transport (LEDBAT) , 2012, RFC.

[3]  Sy-Yen Kuo,et al.  Introducing P2P architecture in adaptive covert communication system , 2009, 2009 First Asian Himalayas International Conference on Internet.

[4]  C. Pandu Rangan,et al.  Steganographic Communication in Ordered Channels , 2006, Information Hiding.

[5]  Roger Wattenhofer,et al.  Hidden communication in P2P networks Steganographic handshake and broadcast , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Adi Shamir,et al.  The Steganographic File System , 1998, Information Hiding.

[7]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[8]  Deepa Kundur,et al.  Practical Internet Steganography : Data Hiding in IP , 2003 .

[9]  Wojciech Mazurczyk,et al.  What more can be learnt about BitTorrent from meta-data files and μTorrent logs? , 2011, ArXiv.

[10]  Timothy Roscoe,et al.  Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.

[11]  Xingming Sun,et al.  A Steganography Scheme in P2P Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Xiapu Luo,et al.  Robust Network Covert Communications Based on TCP and Enumerative Combinatorics , 2012, IEEE Transactions on Dependable and Secure Computing.

[13]  Wojciech Mazurczyk,et al.  VoIP steganography and its Detection—A survey , 2012, ACM Comput. Surv..

[14]  D. H. Lehmer Teaching combinatorial tricks to a computer , 1960 .