Enhanced TCP Sequence Number Steganography using Dynamic Identifier

Network steganography is a branch of steganography that hides information through packet header manipulation and uses protocols as carriers to hide secret information. Many techniques were already developed using the Transmission Control Protocol (TCP) headers. Among the schemes in hiding information in the TCP header, the Initial Sequence Number (ISN) field is the most difficult to be detected since this field can have arbitrary values within the requirements of the standard. In this paper, a more undetectable scheme is proposed by increasing the complexity of hiding data in the TCP ISN using dynamic identifiers. The experimental results have shown that using Bayes Net, the proposed scheme outperforms the existing scheme with a low detection accuracy of 0.52%.

[1]  Prashant R. Deshmukh,et al.  Active warden for TCP sequence number base covert channel , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[2]  Sathiamoorthy Manoharan,et al.  Network steganography and steganalysis - a concise review , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[3]  Wojciech Mazurczyk,et al.  Information hiding , 2017, Commun. ACM.

[4]  Joanna Rutkowska joanna The Implementation of Passive Covert Channels in the Linux Kernel , 2004 .

[5]  Yun Q. Shi,et al.  Detecting Covert Channels in Computer Networks Based on Chaos Theory , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Galyna Liashenko,et al.  Network steganography application for remote biometrie user authentication , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[7]  Liusheng Huang,et al.  A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine , 2015, Secur. Commun. Networks.

[8]  Krzysztof Szczypiorski,et al.  Steg Blocks: Ensuring Perfect Undetectability of Network Steganography , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[9]  Liusheng Huang,et al.  Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[10]  Craig H. Rowland,et al.  Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.

[11]  Aleksandra Mileva,et al.  Covert channels in TCP/IP protocol stack - extended version- , 2014, Central European Journal of Computer Science.

[12]  Jianhua Yang,et al.  Inject Stenography into Cybersecurity Education , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[13]  Wojciech Mazurczyk,et al.  Principles and overview of network steganography , 2012, IEEE Communications Magazine.

[14]  Sandip Bobade,et al.  Secure Data Communication Using Protocol Steganography in IPv6 , 2015, 2015 International Conference on Computing Communication Control and Automation.

[15]  KokSheik Wong,et al.  AIPISteg: An active IP identification based steganographic method , 2016, J. Netw. Comput. Appl..

[16]  Arun Kumar,et al.  Survey on steganography methods (text, image, audio, video, protocol and network steganography) , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[17]  K Anjan,et al.  Construction of Covert Channel Using Data Hiding Mechanism In Ipv4 , 2015 .

[18]  Wojciech Mazurczyk,et al.  Towards Utilization of Covert Channels as a Green Networking Technique , 2018, ARES.