{"title":"A Method of Hidden Data Transmission Based on the Generation of Initial Sequence Numbers of TCP Connections","authors":"Valerii Chystov, Konstantyn Vasiuta, Serhii Osievsky, Oleksii Nesmiian, Iryna Zakharchenko, Illya Hridasov","doi":"10.1109/PICST57299.2022.10238572","DOIUrl":null,"url":null,"abstract":"Known methods of hidden data transmission in information and telecommunication networks (ITCN), based on the management of the length of the payload field of the TCP protocol and the retransmission of delayed fragments, are unstable to detection according to the known mathematical model and reduce the efficiency of management of subordinate units due to time limits on the possibility of repeated parcels. This led to the inconsistency of management secrecy requirements, the capabilities of existing methods of hidden data transmission in ITCN and prompted the development of a new method. Based on the above, an important scientific task is the development of a method of hidden data transmission in ITCN based on the use of structural features of the TCP protocol of the network operating system.","PeriodicalId":330544,"journal":{"name":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST57299.2022.10238572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Known methods of hidden data transmission in information and telecommunication networks (ITCN), based on the management of the length of the payload field of the TCP protocol and the retransmission of delayed fragments, are unstable to detection according to the known mathematical model and reduce the efficiency of management of subordinate units due to time limits on the possibility of repeated parcels. This led to the inconsistency of management secrecy requirements, the capabilities of existing methods of hidden data transmission in ITCN and prompted the development of a new method. Based on the above, an important scientific task is the development of a method of hidden data transmission in ITCN based on the use of structural features of the TCP protocol of the network operating system.