Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach
Title | Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring Approach |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Lehner, F., Mazurczyk, W., Keller, J., Wendzel, S. |
Conference Name | 2017 IEEE 42nd Conference on Local Computer Networks (LCN) |
ISBN Number | 978-1-5090-6523-3 |
Keywords | Bandwidth, composability, computer network security, cryptographic protocols, data encapsulation, Data visualization, defensive systems, delays, Electronic mail, Google, Information hiding, inter-protocol hiding techniques, inter-protocol steganography, malicious control server, Metrics, network steganography, network threats, network traffic coloring, overt protocols, privacy, Protocols, pubcrawl, real-time services, Real-time Systems, RTCP, RTP, steganography, steganography detection, steganography detection approach, Traffic Coloring |
Abstract | Due to improvements in defensive systems, network threats are becoming increasingly sophisticated and complex as cybercriminals are using various methods to cloak their actions. This, among others, includes the application of network steganography e.g. to hide the communication between an infected host and a malicious control server by embedding commands into innocent-looking traffic. Currently, a new subtype of such methods called inter-protocol steganography emerged. It utilizes relationships between two or more overt protocols to hide data. In this paper, we present new inter-protocol hiding techniques which are suitable for real-time services. Afterwards, we introduce and present preliminary results of a novel steganography detection approach which relies on network traffic coloring. |
URL | https://ieeexplore.ieee.org/document/8109332/ |
DOI | 10.1109/LCN.2017.32 |
Citation Key | lehner_inter-protocol_2017 |
- network steganography
- Traffic Coloring
- steganography detection approach
- steganography detection
- Steganography
- RTP
- RTCP
- real-time systems
- real-time services
- pubcrawl
- Protocols
- privacy
- overt protocols
- network traffic coloring
- network threats
- Bandwidth
- Metrics
- malicious control server
- inter-protocol steganography
- inter-protocol hiding techniques
- Information hiding
- Electronic mail
- delays
- defensive systems
- Data visualization
- data encapsulation
- Cryptographic Protocols
- computer network security
- composability