1 / 11

Network Steganography Methods

Network Steganography Methods. By Naga Dinesh Reddy Chavva. What is Steganography ?. The word steganography is of Greek origin and means "concealed writing."

gzifa
Download Presentation

Network Steganography Methods

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Steganography Methods By Naga Dinesh Reddy Chavva

  2. What is Steganography ? • The word steganography is of Greek origin and means "concealed writing." • It combines the Greek words steganos(στεγανός), meaning "covered or protected," and graphei (γραφή) meaning "writing.“ • Steganography is the art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

  3. Network Steganography • Typical steganographicmethods utilize digital media (images, audio and video files) as a cover for hidden data. • Network steganography utilizes communication protocols' control elements and their basic intrinsic functionality. • Typical network steganography method uses modification of a single network protocol.

  4. The protocol modification may be applied to the PDU (Protocol Data Unit), time relations between exchanged PDUs, or both (hybrid methods). • Network Steganography is classified into two types of protocol modification. • intra-protocol • inter-protocol

  5. Classification

  6. Intra-protocol method HICCUPS Hidden Communication System for Corrupted Networks • It modifies frames protocol specific fields and their content. It is especially suitable for WLANs (Wireless Local Area Networks) • Usage of frames with intentionally wrong checksums to establish covert communication

  7. HICCUPS Operation • It is a steganographic system for hidden group with common knowledge. • Host sends a corrupted frame (with incorrect checksum) • Remaining hidden hosts change their mode of operation to corrupted frame mode. • HICCUPS replaces payload of intentionally corrupted frames at the transmitter

  8. HICCUPS Operation

  9. HICCUPS Operation

  10. Questions ?

  11. THANK YOU

More Related