مرور و مقایسه روش‌های نهان‌نگاری شبکه بر مبنای طبقه‌بندی‌های مختلف

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی کارشناسی ارشد مهندسی فناوری اطلاعات، دانشکده‌ی فنی/مهندسی، دانشگاه الزهراء.

2 استادیار گروه مهندسی کامپیوتر، دانشکده‌ی فنی/مهندسی، دانشگاه الزهراء.

چکیده

رشد اینترنت و شبکه‌های رایانه­ای، سبب ساده‌سازی ارسال اطلاعات شده است. این توسعه سبب ایجاد مشکلاتی نیز شده است چون در محیط‌های شبکه‌ای، امکان جاسوسی داده حین ارسال از فرستنده به گیرنده وجود دارد؛ بنابراین، لزوم ایجاد امنیت اطلاعات همواره وجود دارد و در این میان، نهان‌نگاری نقش مهمی را ایفا می‌کند. نهان‌نگاری شبکه یک روش نهان‌نگاری با استفاده از پروتکل‌های شبکه است. روش­های بسیاری برای نهان‌نگاری شبکه تا به‌حال پیشنهاد شده است که آشنایی با الگوریتم و به­علاوه مزایا و معایب هرکدام از آن‌ها برای محققان این حوزه جهت ارائه روش نهان‌نگاری جدید و یا جهت پیشنهاد روش نهان‌کاوی جدید ضروری است. در این مقاله تلاش شده است در قالب دو طبقه‌بندی مختلف، ایده‌های گوناگون موجود در روش‌های نهان‌نگاری شبکه تشریح شوند. با توجه به تضاد موجود در سه معیار ارزیابی ظرفیت، عدم تشخیص تمایز و مقاومت، طراحی روشی که در هر سه معیار برتر باشد نقطه ایده­آل است ولی بسته به اهمیت هر کدام از این معیارها در کاربرد مورد نظر، می‌توان با توجه به مقایسه انجام‌شده در این تحقیق یک یا چند روش برتر را معرفی کرد.

کلیدواژه‌ها


عنوان مقاله [English]

Review and Comparison of Network Steganography Methods Based On Different Classifications

نویسندگان [English]

  • M. Shoaei 1
  • V. Sabeti 2
1 alzahra university
2 alzahra university
چکیده [English]

The growth of Internet and computer networks has led to the ease of information transfer. This development has also caused some problems due to the fact that in network environments, data may be snooped while transferring from the sender to the receiver. So, it is always necessary to provide information security and in order to achieve this goal, steganography plays an important role. Network steganography is a method that uses network protocols. Many techniques for network steganography have been suggested up to this time so that familiarity with different algorithms, as well as recognizing the advantages and disadvantages of each of them, are required for researchers in this field who wish to introduce a new approach to steganography or to propose a new method of steganalysis. In this paper, it has been attempted to describe the various ideas behind network steganography methods in terms of two different classifications, and the result of the research have been presented. Although it would be ideal to devise a method which satisfies the three steganography evaluation criteria: capacity, undetectability and robustness simultaneously, but bearing in mind the conflict between them, a method can be proposed for each application which excels in the criterion that is most relevant in that application.

کلیدواژه‌ها [English]

  • Vulnerability
  • Infrastructure
  • Passive Defense
  • West Azerbaijan province
  1. H. Sajedi and Sh. R. Yaghoubi, “Review on Steganographic Methods in Texts,” 2018. (In Persian)##
  2. A. Stančić, I. Grgurevic, and V. Vyroubal, “Usage of the Steganography within Highway Information and Communication Network,” 4th International Virtual Research Conference In Technical Disciplines (RCITD 2016), Slovakia, 2016.##
  3. J. Zhai, M. Wang, G. Liu, and Y. Dai, “SkyLen: a           Skype-Based Length Covert Channel,” Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 3, May 2015.##
  4. B. G. Banik and S. K. Bandyopadhyay, “Review on Steganography in Digital Media,” International Journal of Science and Research (IJSR), vol. 4, pp. 1-10, 2015.##
  5. M. M. Pontón Loaiza, “Steganography using RTP Packets,” University of Abertay Dundee, Dundee, September 2014.##
  6. A. P. Dhamade and K. J. Panchal, “Packet Data Based Network Steganography,” International Journal of Advance Engineering and Research Development, vol. 2, no. 5, pp. 1520-1526, May 2015.##
  7. A. NoorAzar, Z. Norouzi, and M. Mir, “Representing an Enhanced Method based on Image Steganography based on Linear Codes Features,” Journal of Electronic and Cyber Defence, vol. 5, no. 4, pp. 43-53, 2018. (In Persian)##

 8.     V. Sabeti, Sh, Samavi, and M. R. Ahmadzadeh, “Steganalysis of the Steganographic Method based on Pixels Value Differencing in Random Intervals using Neural Networks,” 14th National Conference of Computer Society of Iran, March 2009. (In Persian)##

  1. W. Mazurczyk, S. Wendzel, S. Zander, A. Houmansadr, and K. Szczypiorski, “Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures,” IEEE Press Series on Information & Communication Networks Security, 2016.##
  2. S. Wendzel, S. Zander, B. Fechner, and C. Herdin,       “Pattern-Based Survey and Categorization of Network Covert Channel Techniques,” ACM Computing Surveys (CSUR), vol. 47, no. 3, pp. 50-77, 2015.##
  3. J. P. Black, “Techniques of Network Steganography and Covert Channels”, Sciences, 2013.##
  4. J. Lubacz, W. Mazurczyk, and K. Szczypiorski, “Principles and Overview of Network Steganography,” IEEE Communications Magazine, vol. 52, no. 5, pp. 225-229, 2014.##
  5. M. Van Horenbeeck, “Deception on the Network: Thinking Differently About Covert Channels,” Proc. 7th Australian Info, Warfare and Security Conf., 2006.##
  6. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” IBM. System Journal, vol. 35, no. 3, pp. 313–336, 1996.##
  7. W. Mazurczyk and K. Szczypiorski, “Covert Channels in SIP for VoIP signaling,” Proc. of 4th International Conference on Global E-security, United Kingdom, pp. 65-72, June 2008.##
  8. W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “Retransmission steganography and its detection,” Soft Computing, vol. 15, no. 3, pp. 505-515, 2011.##
  9. D. Kundur and K. Ahsan, “Practical Internet Steganography: Data Hiding in IP,” Proc. Texas Wksp. Security of Information Systems, 2003.##
  10. B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “PadSteg: Introducing Inter-Protocol Steganography,” Telecommunication Systems, vol. 52, no. 2, pp. 1101-1111, 2013.##
  11. K. Szczypiorski, “Steganography in TCP/IP Networks,” State of the Art and a Proposal of a New System – HICCUPS, Institute of Telecommunications' seminar, Warsaw University of Technology, Poland, November 2003.##
  12. K. Szczypiorski and W. Mazurczyk, “Steganography in IEEE 802.11 OFDM Symbols,” International Journal of Security and Communication Networks, vol. 3, no. 2, pp. 118-129, 2011.##
  13. P. Bialczak, W. Mazurczyk, and K. Szczypiorski, “Sending Hidden Data via Google Suggest,” 2011.##
  14. W. Mazurczyk and K. Szczypiorski, “Steganography of VoIP streams”, OTM Confederated International Conferences, On the Move to Meaningful Internet Systems, pp. 1001-1018. Springer, Berlin, 2008.##
  15. W. Mazurczyk and J. Lubacz, “LACK: a VoIP steganographic method,” Telecommunication Systems: Modelling, Analysis, Design and Management, vol. 45, no. 2, pp. 153-163, 2010.##
  16. W. Mazurczyk, J. Lubacz, and K. Szczypiorski. “On steganography in lost audio packets,” International Journal of Security and Communication Networks, vol. 7, no. 12, pp. 2602-2615, 2014.##
  17. W. Mazurczyk, “Lost audio packets steganography: a first practical evaluation,” International Journal of Security and Communication Networks, vol. 5, no. 12, pp. 1394-1403, 2012.##
  18. W. Mazurczyk, M. Smolarczyk, and K. Szczypiorski. “On information hiding in retransmissions,” Telecommunication Systems, vol. 52, no. 2, pp. 1113-1121, 2013.##

27.  W. Mazurczyk, P. Szaga, and K. Szczypiorski, “Using Transcoding for Hidden Communication in IP Telephony,” Multimedia Tools and Applications, vol. 70, no. 3, pp.     2139-2165, 2014.##

  1. W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Stream Control Transmission Steganography,” arXiv preprint arXiv: 1006.0247, 2010.##
  2. B. Jankowski, W. Mazurczyk, and K. Szczypiorski, “Information Hiding Using Improper Frame Padding,” Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2010 14th International. IEEE, 2010.##
  3. W. Fraczek, W. Mazurczyk, and K. Szczypiorski, “Multi-Level Steganography: Improving Hidden Communication in Networks,” Journal of Universal Computer Science (J. UCS), Journal of Universal Computer Science (J. UCS), vol. 18, no. 14, pp. 1967-1986, 2012.##
  4. S. Ghanbari, N. Ghanbari, M. Keshtgari, and H. N. Karizi, “Steganalyisis in Images using Co-occurrence Matrix and Neural Networks,” Iranian Journal of Electrical and Computer Engineering, vol. 9, no. 3, 2012. (In Persian)##