{"title":"Yet Another Network Steganography Technique Basedon TCP Retransmissions","authors":"Artur M. Brodzki, Jȩdrzej Bieniasz","doi":"10.1109/icfsp48124.2019.8938085","DOIUrl":null,"url":null,"abstract":"This paper introduces a new technique of network steganography using the TCP protocol retransmission mechanism. The method can use any user-generated network traffic as hidden transmission channel. It utilizes overwriting TCP segments payload without recalculating checksums. Therefore, a segment after reaching its target is considered incorrect and it can be taken over to extract hidden data. Despite that, the segment is normally retransmitted according to the protocol specification; thanks to this, normal user communication is not affected. Following this idea, the basic mechanisms of this technique were designed and implemented. The testbed environment was prepared to conduct the initial proof-of-concept experiments and to measure basic operational metrics. The average steganographic bandwidth at the level of 2 kB/s was achieved for the conditions ensuring the proper level of undetectability. Discussion of the method detection possibilities was carried out and the directions of research development in this area were presented.","PeriodicalId":162584,"journal":{"name":"2019 5th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icfsp48124.2019.8938085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper introduces a new technique of network steganography using the TCP protocol retransmission mechanism. The method can use any user-generated network traffic as hidden transmission channel. It utilizes overwriting TCP segments payload without recalculating checksums. Therefore, a segment after reaching its target is considered incorrect and it can be taken over to extract hidden data. Despite that, the segment is normally retransmitted according to the protocol specification; thanks to this, normal user communication is not affected. Following this idea, the basic mechanisms of this technique were designed and implemented. The testbed environment was prepared to conduct the initial proof-of-concept experiments and to measure basic operational metrics. The average steganographic bandwidth at the level of 2 kB/s was achieved for the conditions ensuring the proper level of undetectability. Discussion of the method detection possibilities was carried out and the directions of research development in this area were presented.