All advice ambuscade techniques that may be acclimated to barter steganograms in telecommunication networks can be classified beneath the accepted appellation of arrangement steganography. This classification was originally alien by Krzysztof Szczypiorski in 2003.6 Contrary to the archetypal steganographic methods which advance agenda media (images, audio and video files) as a awning for hidden data, arrangement steganography utilizes advice protocols' ascendancy elements and their basal built-in functionality. As a result, such methods are harder to ascertain and eliminate.7
Typical arrangement steganography methods absorb modification of the backdrop of a individual arrangement protocol. Such modification can be activated to the PDU (Protocol Abstracts Unit),8910 to the time relations amid the exchanged PDUs,11 or both (hybrid methods).12
Moreover, it is achievable to advance the affiliation amid two or added altered arrangement protocols to accredit abstruse communication. These applications abatement beneath the appellation inter-protocol steganography.13
Network steganography covers a ample spectrum of techniques, which include, a part of others:
Steganophony - the beard of letters in Voice-over-IP conversations, e.g. the application of delayed or besmirched packets that would commonly be abandoned by the receiver (this adjustment is alleged LACK - Lost Audio Packets Steganography), or, alternatively, ambuscade advice in bare attack fields.14
WLAN Steganography – the appliance of methods that may be acclimatized to address steganograms in Wireless Local Area Networks. A applied archetype of WLAN Steganography is the HICCUPS arrangement (Hidden Advice Arrangement for Besmirched Networks)
Typical arrangement steganography methods absorb modification of the backdrop of a individual arrangement protocol. Such modification can be activated to the PDU (Protocol Abstracts Unit),8910 to the time relations amid the exchanged PDUs,11 or both (hybrid methods).12
Moreover, it is achievable to advance the affiliation amid two or added altered arrangement protocols to accredit abstruse communication. These applications abatement beneath the appellation inter-protocol steganography.13
Network steganography covers a ample spectrum of techniques, which include, a part of others:
Steganophony - the beard of letters in Voice-over-IP conversations, e.g. the application of delayed or besmirched packets that would commonly be abandoned by the receiver (this adjustment is alleged LACK - Lost Audio Packets Steganography), or, alternatively, ambuscade advice in bare attack fields.14
WLAN Steganography – the appliance of methods that may be acclimatized to address steganograms in Wireless Local Area Networks. A applied archetype of WLAN Steganography is the HICCUPS arrangement (Hidden Advice Arrangement for Besmirched Networks)
No comments:
Post a Comment