PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents a practical implementation of the non-classified data hiding system (NDHS) understood as a military platform for information warfare that takes advantage of the hidden data transmission for voice connections in order to gain informational lead over a potential enemy. The NDHS performs here as a botnet network that is managed by the hidden transmission controller referred to as the master resident. Research studies are dedicated to investigation of various connections in heterogeneous links as well as functionalities of such components as hidden protocol bridges and the master resident.
Rocznik
Tom
Strony
11--16
Opis fizyczny
Bibliogr. 17 poz., rys.
Twórcy
autor
Bibliografia
  • [1] http://sodaphish.com/files/ebks/try2innovate.com/downloads/E-books/Networking/Network%20Management.pdf
  • [2] B. Żołtak, “VMPC – One way function and stream cipher”, in Proc. 11th Int. Worksh. Fast Software Encryption 2004 FSE’2004, Delhi, India, 2004.
  • [3] Z. Piotrowski, “The national network-centric system and its components in the age of information warfare”, in Safety and Security Engineering III, M. Guarascio, C. A. Brebbia, And F. Garzia, Eds. Southampton, Boston, WIT Press 2009, pp. 301–309.
  • [4] Z. Piotrowski, “Effective method of the watermark embedding and decoding in the broadcast audio signal band”, Ph.D. thesis, Military University of Technology, Warsaw, Poland, 2005.
  • [5] NATO Glossary of Abbreviations Used in NATO Documents and Publications, NATO Standardization Agency, 2010.
  • [6] NATO MC 0064/10 – NATO Electronic Warfare Policy, NATO Electronic Warfare Advisory Committee NEWAC, 2010.
  • [7] K. Wodecki, “Hidden protocol interpreter and its main features in the watermarking battle net”, in Proc. 2nd AFCEA Europe Student Conf., Brussels, Belgium, 2009.
  • [8] Z. Piotrowski, K. Sawicki, M. Bednarczyk, and P. Gajewski, “New hidden and secure data transmission method proposal for military IEEE 802.11 networks”, in Proc. Sixth Int. Conf. Intel. Inf. Hid. – Multim. Sign. Proces. 2010 IIHMSP 2010, Darmstadt, Germany (submitted for publication).
  • [9] K. Szczypiorski, “HICCUPS: Hidden communication system for corrupted networks”, in Proc. 10th Int. Multi-Conf. Adv. Comp. Sys. ACS 2003, Międzyzdroje, Poland, 2003.
  • [10] W. Mazurczyk and K. Szczypiorski, “Steganography in handling oversized IP packets”, in Proc. Int. Conf. Multime. Inf. Netwo. Sec. MINES 2009, Wuhan, Hubei, China, 2009, vol. I, pp. 559–564.
  • [11] L. Frikha, Z. Trabelsi, and W. El-Hajj, “Implementation of a covert channel in the 802.11 header”, in Proc. Int. Wir. Commun. Mob. Comput. Conf. IWCMC 2008, Crete Island, Greece, 2008, pp. 594–599.
  • [12] K. Szczypiorski, I. Margasiński, and W. Mazurczyk, “Steganographic routing in multi agent system environment”, J. Inf. Assur. Sec., vol. 2, iss. 3, pp. 153–154, 2007.
  • [13] T. E. Calhoun, R. Newman, and R. Beyah, Authentication in 802.11 LANs Using a Covert Side Channel, Atlanta, Georgia State University, 2009.
  • [14] Z. Piotrowski and P. Gajewski, “Novel method for watermarking system operating on the HF and VHF radio links”, in Computational Methods and Experimental Measurements XIII, C. A. Brebbia and G. M. Carlomagno, Eds. Southampton, Boston, WIT Press 2007, pp. 791–800.
  • [15] Z. Piotrowski, L. Zagoździński, P. Gajewski, and L. Nowosielski, “Handset with hidden authorization function”, in Proc. Eur. DSP Educ. Res. Symp. EDERS 2008, Tel Aviv, Israel, 2008, pp. 201–205.
  • [16] P. Gajewski, J. Łopatka and Z. Piotrowski, “A new method of frequency offset correction using coherent averaging”, J. Telecommun. Inf. Technol., vol. 1, pp. 142–146, 2005.
  • [17] Z. Piotrowski, “Drift correction modulation scheme for digital audio watermarking”, in Proc. Int. Conf. Multime. Inf. Netw. Secur. MINES 2010, Nanjing, China (submitted for publication).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0013-0035
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.