PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

ARPNetSteg : Network Steganography Using Address Resolution Protocol

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Twórcy
autor
  • University of Delhi, Delhi, India.
autor
  • University of Delhi, Delhi, India.
Bibliografia
  • [1] W. Richard Stevens. TCP/IP illustrated (vol. 1): the protocols. Addison-Wesley Longman Publishing Co., Inc., USA. 1993.
  • [2] Trithemius, Johannes, and Wolfgang Ernst Heidel. Steganographia. 1721.
  • [3] I. Cox, Miller, M., Bloom, J. Fridrich and T. Kalker. “Digital Watermarking and Steganography”, 2nd ed. Elsevier, Morgan Kaufmann Publishers, 2008.
  • [4] K. Szczypiorski, “Steganography in TCP/IP networks”, in State of the Art and a Proposal of a New System–HICCUPS, Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, 2003.
  • [5] G. Fisk, M. Fisk, C. Papadopoulos and J. Neil, “Eliminating Steganography in Internet Traffic with Active Wardens,” in Proc. 5th International Workshop on Information Hiding, Oct. 2002.
  • [6] D. Plummer, "An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware", STD 37, RFC 826, Nov. 1982, DOI 10.17487/RFC0826.
  • [7] ARP, Address Resolution Protocol, “Network Socery Website,” 2015 http://www.networksorcery.com/enp/protocol/arp.htm.
  • [8] TCP/IP Guide Website, 2020 http://www.tcpipguide.com/free/t_ARPMessageFormat.htm.
  • [9] T. G. Handel and M. T. Sandford, “Hiding data in the OSI network model.” in Proc. International Workshop on Information Hiding, Berlin, Heidelberg, 1996, pp. 23-38.
  • [10] A. Mileva, and P. Boris, "Covert channels in TCP/IP protocol stack-extended version." Open Computer Science vol. 4, pp 45-66, 2014.
  • [11] C. Rowland, "Covert channels in the TCP/IP protocol suite, first Monday." Peer Reviewed Journal on the Internet vol. 2, no. 5, 1997.
  • [12] K. Ahsan, and D Kundur, “Practical data hiding in TCP/IP” in Proc. Workshop on Multimedia Security at ACM Multimedia, 2002.
  • [13] Bellovin, M. Steven, "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review, vol. 19, no. 2, pp 32-48, 1989.
  • [14] K. Szczypiorski, M. Drzymała, and M. Ł. Urbański. "Network Steganography in the DNS Protocol." International Journal of Electronics and Telecommunications, vol. 62, no. 4, pp. 343-346, 2016.
  • [15] Z. Trabelsi and I. Jawhar, "Covert file transfer protocol based on the IP record route option." Journal of Information Assurance and Security vol. 5 no. 1, pp. 64-73, 2010.
  • [16] P. Bedi, A. Dua, “Network Steganography using the Overflow Field of Timestamp Option in an IPv4 Packet”. Presented at Third International Conference on Computing and Network Communications (CoCoNet’19), Trivendrum, Dec. 18-21, 2019.
  • [17] L. Ji, Y. Fan, C. Ma, “Covert channel for local area network,” in Proc. IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, Beijing, China, 2010, pp. 316–319.
  • [18] B. Jankowski, W. Mazurczyk, K. Szczypiorski, “PadSteg: Introducing Inter-Protocol Steganography,” Telecommunication Systems, Vol. 52, 2013, pp. 1101–1111.
  • [19] S. Tobias, S. Wendzel, A. Mileva, and W. Mazurczyk, "Introducing dead drops to network steganography using ARP-caches and SNMP-walks," in Proc. 14th International Conference on Availability, Reliability and Security, 2019, pp. 1-10.
  • [20] Scapy Website, 2020. https://scapy.readthedocs.io/en/latest/introduction.html
  • [21] Wireshark website, 2020, https://www.wireshark.org
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4fa13122-33e6-4b4e-8782-ee1d7cd26b74
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.