10 research outputs found

    "The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography

    Full text link
    In this paper we propose a new method for the evaluation of network steganography algorithms based on the new concept of "the moving observer". We considered three levels of undetectability named: "good", "bad", and "ugly". To illustrate this method we chose Wi-Fi steganography as a solid family of information hiding protocols. We present the state of the art in this area covering well-known hiding techniques for 802.11 networks. "The moving observer" approach could help not only in the evaluation of steganographic algorithms, but also might be a starting point for a new detection system of network steganography. The concept of a new detection system, called MoveSteg, is explained in detail.Comment: 6 pages, 6 figures, to appear in Proc. of: ICNIT 2015 - 6th International Conference on Networking and Information Technology, Tokyo, Japan, November 5-6, 201

    A Dynamic, Broad Spectrum Approach to Covert Channels

    Get PDF
    In most covert channel systems, bandwidth is sacrificed for covertness. By using a dynamic, broad spectrum approach it was possible to use multiple covert channels to create a larger pipeline for data transmission. This approach utilized a monitor to determine how much data the network would be able to support before suspicion would be drawn to the change in traffic utility. The system then dispersed this traffic to each protocol proportionately using their monitored utility as a guide. A feedback channel was also utilized to determine if channel transmissions were successful and disabled any channels for future use that the network security blocked. In this way, a robust channel system was created that also increased bandwidth of communication

    StegBlocks: ensuring perfect undetectability of network steganography

    Full text link
    The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties which will be used to transfer hidden messages. The objects are dependent on a specific network protocol (or application) used as a carrier for a given network steganography method. Moreover, the paper presents the approach to perfect undetectability of network steganography, which was developed based on the rules of undetectability for general steganography. The approach to undetectability of network steganography was used to show the possibility of developing perfectly undetectable network steganography methods using the StegBlocks concept.Comment: 6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 201

    Fuzzy Logic

    Get PDF
    The capability of Fuzzy Logic in the development of emerging technologies is introduced in this book. The book consists of sixteen chapters showing various applications in the field of Bioinformatics, Health, Security, Communications, Transportations, Financial Management, Energy and Environment Systems. This book is a major reference source for all those concerned with applied intelligent systems. The intended readers are researchers, engineers, medical practitioners, and graduate students interested in fuzzy logic systems

    Capacity is the wrong paradigm

    No full text

    Capacity is the wrong paradigm

    No full text
    At present, "capacity " is the prevailing paradigm for covert channels. With respect to steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this paper, we propose a new paradigm called "capability " which gauges the effectiveness of a steganographic method. It includes payload carrying ability, detectability, and robustness components. We also discuss the use of zero-error capacity for channel analysis and demonstrate that a JPEG compressed image always has the potential to carry hidden information. 1

    Capacity is the Wrong Paradigm

    No full text
    corecore