Steganalysis of Network Packet Length Based Data Hiding
- PDF / 1,313,465 Bytes
- 18 Pages / 439.37 x 666.142 pts Page_size
- 52 Downloads / 161 Views
Steganalysis of Network Packet Length Based Data Hiding Arijit Sur · Anand S. Nair · Abhishek Kumar · Apul Jain · Sukumar Nandi
Received: 19 May 2012 / Revised: 10 September 2012 / Published online: 29 September 2012 © Springer Science+Business Media New York 2012
Abstract Recently, data hiding by modifying network parameters like packet header, payload, and packet length has become popular among researchers. Different algorithms have been proposed during the last few years which have altered the network packets in different ways to embed the data bits. Some of these algorithms modify the network packet length for embedding. Although most of the packet length based embedding schemes try to imitate the normal network traffic distribution, they have altered the statistical distribution of network packet lengths during embedding. These statistical anomalies can be exploited to detect such schemes. In this paper, a second order detection scheme for packet length based steganography has been proposed. A comprehensive set of experiments have been carried out to show that the proposed detection scheme can detect network packet length based steganography with a considerably high accuracy. Keywords Steganography · Steganalysis · Network packet length · Covert channel
A. Sur () · A.S. Nair · A. Jain · S. Nandi Department of Computer Science and Engineering, IIT Guwahati, Guwahati 781039, India e-mail: [email protected] A.S. Nair e-mail: [email protected] A. Jain e-mail: [email protected] S. Nandi e-mail: [email protected] A. Kumar Department of Mathematics and Computing, IIT Guwahati, Guwahati 781039, India e-mail: [email protected]
1240
Circuits Syst Signal Process (2013) 32:1239–1256
1 Introduction Steganography, a word which originates from ancient Greece, literally means covert writing. Basically, steganography is an art of secret communication which includes a vast array of methods of secret communication that conceal the very existence of hidden information. Traditional methods include the use of invisible inks, microdots, etc. Modern day steganographic techniques try to exploit digital media images, audio files, video files [17–19], or even network packets [2, 13]. In the recent past, network steganography has become an interesting research domain where secret data are embedded not only into a network packet’s header or its payload, but into the structure of the packet streams. Some algorithms have also used a hybrid of both techniques. Network packet header based schemes [1, 2] generally have high steganographic capacity, but they can be easily detectable [13]. The embedding of secret data in the TCP header is described in [13]. On the other hand, network packet payload based embedding schemes are less vulnerable but are of limited capacity. Another method involves hiding the data in both the header and payload of the network packet [23]. Packet stream based schemes have been proposed in [21], and a hybrid scheme is proposed in [12]. The concept of covert channels was first introduced by La
Data Loading...