Covert channel: network steganography deployment
Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communica...
Saved in:
Main Author: | |
---|---|
Format: | Student Project |
Language: | English |
Published: |
Faculty of Information Technology and Quantitative Sciences
2005
|
Online Access: | http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf http://ir.uitm.edu.my/id/eprint/695/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.695 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.6952017-04-28T04:32:27Z http://ir.uitm.edu.my/id/eprint/695/ Covert channel: network steganography deployment Md Ali, Nurul Majdi Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. This project major focus is to deploy steganography on network protocol using covert_TCP tool. This tool uses 3 methods in order to employ steganography at TCP/IP header; IP identification encoding, TCP sequence number encoding and ACK “bouncing” server method. We also employ network steganography in two different network environment which is on transmission on single host (loopback interface) and inter local area network. After that phase, we analyze packet income and out the network. We used network sniffer tool, tcpdump to dump all the packet and analyze the accuracy of the data transmit using covert channel as employ by covert_TCP. Faculty of Information Technology and Quantitative Sciences 2005 Student Project NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf Md Ali, Nurul Majdi (2005) Covert channel: network steganography deployment. [Student Project] (Unpublished) |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
description |
Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. This project major focus is to deploy steganography on network protocol using covert_TCP tool. This tool uses 3 methods in order to employ steganography at TCP/IP header; IP identification encoding, TCP sequence number encoding and ACK “bouncing” server method. We also employ network steganography in two different network environment which is on transmission on single host (loopback interface) and inter local area network. After that phase, we analyze packet income and out the network. We used network sniffer tool, tcpdump to dump all the packet and analyze the accuracy of the data transmit using covert channel as employ by covert_TCP. |
format |
Student Project |
author |
Md Ali, Nurul Majdi |
spellingShingle |
Md Ali, Nurul Majdi Covert channel: network steganography deployment |
author_facet |
Md Ali, Nurul Majdi |
author_sort |
Md Ali, Nurul Majdi |
title |
Covert channel: network steganography deployment |
title_short |
Covert channel: network steganography deployment |
title_full |
Covert channel: network steganography deployment |
title_fullStr |
Covert channel: network steganography deployment |
title_full_unstemmed |
Covert channel: network steganography deployment |
title_sort |
covert channel: network steganography deployment |
publisher |
Faculty of Information Technology and Quantitative Sciences |
publishDate |
2005 |
url |
http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf http://ir.uitm.edu.my/id/eprint/695/ |
_version_ |
1685648082011684864 |
score |
13.211869 |