10 research outputs found
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
In this paper we propose a new method for the evaluation of network
steganography algorithms based on the new concept of "the moving observer". We
considered three levels of undetectability named: "good", "bad", and "ugly". To
illustrate this method we chose Wi-Fi steganography as a solid family of
information hiding protocols. We present the state of the art in this area
covering well-known hiding techniques for 802.11 networks. "The moving
observer" approach could help not only in the evaluation of steganographic
algorithms, but also might be a starting point for a new detection system of
network steganography. The concept of a new detection system, called MoveSteg,
is explained in detail.Comment: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th
International Conference on Networking and Information Technology, Tokyo,
Japan, November 5-6, 201
A Dynamic, Broad Spectrum Approach to Covert Channels
In most covert channel systems, bandwidth is sacrificed for covertness. By using a dynamic, broad spectrum approach it was possible to use multiple covert channels to create a larger pipeline for data transmission. This approach utilized a monitor to determine how much data the network would be able to support before suspicion would be drawn to the change in traffic utility. The system then dispersed this traffic to each protocol proportionately using their monitored utility as a guide. A feedback channel was also utilized to determine if channel transmissions were successful and disabled any channels for future use that the network security blocked. In this way, a robust channel system was created that also increased bandwidth of communication
StegBlocks: ensuring perfect undetectability of network steganography
The paper presents StegBlocks, which defines a new concept for performing
undetectable hidden communication. StegBlocks is a general approach for
constructing methods of network steganography. In StegBlocks, one has to
determine objects with defined properties which will be used to transfer hidden
messages. The objects are dependent on a specific network protocol (or
application) used as a carrier for a given network steganography method.
Moreover, the paper presents the approach to perfect undetectability of network
steganography, which was developed based on the rules of undetectability for
general steganography. The approach to undetectability of network steganography
was used to show the possibility of developing perfectly undetectable network
steganography methods using the StegBlocks concept.Comment: 6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber
Crime (IWCC 2015), co-located with 10th International Conference on
Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28
August 201
Fuzzy Logic
The capability of Fuzzy Logic in the development of emerging technologies is introduced in this book. The book consists of sixteen chapters showing various applications in the field of Bioinformatics, Health, Security, Communications, Transportations, Financial Management, Energy and Environment Systems. This book is a major reference source for all those concerned with applied intelligent systems. The intended readers are researchers, engineers, medical practitioners, and graduate students interested in fuzzy logic systems
Capacity is the wrong paradigm
At present, "capacity " is the prevailing paradigm for covert channels. With respect to steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this paper, we propose a new paradigm called "capability " which gauges the effectiveness of a steganographic method. It includes payload carrying ability, detectability, and robustness components. We also discuss the use of zero-error capacity for channel analysis and demonstrate that a JPEG compressed image always has the potential to carry hidden information. 1