Radu-Ioan Ciobanu, M. Tirsa, Raluca Lupu, Sonia Stan, M. Andreica
{"title":"UDP和ICMP的隐写和加密方法","authors":"Radu-Ioan Ciobanu, M. Tirsa, Raluca Lupu, Sonia Stan, M. Andreica","doi":"10.1109/ROEDUNET.2011.5993700","DOIUrl":null,"url":null,"abstract":"Network steganography describes all the methods used for transmitting data over a network without it being detected. Several methods for hiding data in a network have been proposed, but the main drawback of most of them is that they do not offer a secondary layer of protection. If steganography is detected, the data is in plain text. This article proposes an implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it. Furthermore, it describes two less utilized protocols for data hiding, ICMP and UDP, and presents the performance of two scenarios that use SCONeP, in comparison to other steganography tools. Finally, a proof-of-concept active warden used for preventing network steganography is described.","PeriodicalId":277269,"journal":{"name":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"SCONeP: Steganography and Cryptography approach for UDP and ICMP\",\"authors\":\"Radu-Ioan Ciobanu, M. Tirsa, Raluca Lupu, Sonia Stan, M. Andreica\",\"doi\":\"10.1109/ROEDUNET.2011.5993700\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network steganography describes all the methods used for transmitting data over a network without it being detected. Several methods for hiding data in a network have been proposed, but the main drawback of most of them is that they do not offer a secondary layer of protection. If steganography is detected, the data is in plain text. This article proposes an implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it. Furthermore, it describes two less utilized protocols for data hiding, ICMP and UDP, and presents the performance of two scenarios that use SCONeP, in comparison to other steganography tools. Finally, a proof-of-concept active warden used for preventing network steganography is described.\",\"PeriodicalId\":277269,\"journal\":{\"name\":\"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ROEDUNET.2011.5993700\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 RoEduNet International Conference 10th Edition: Networking in Education and Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ROEDUNET.2011.5993700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SCONeP: Steganography and Cryptography approach for UDP and ICMP
Network steganography describes all the methods used for transmitting data over a network without it being detected. Several methods for hiding data in a network have been proposed, but the main drawback of most of them is that they do not offer a secondary layer of protection. If steganography is detected, the data is in plain text. This article proposes an implementation called SCONeP (Steganography and Cryptography over Network Protocols) that offers the protection of hidden data by encrypting it. Furthermore, it describes two less utilized protocols for data hiding, ICMP and UDP, and presents the performance of two scenarios that use SCONeP, in comparison to other steganography tools. Finally, a proof-of-concept active warden used for preventing network steganography is described.