Covert channel: network steganography deployment

Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communica...

Full description

Saved in:
Bibliographic Details
Main Author: Md Ali, Nurul Majdi
Format: Student Project
Language:English
Published: Faculty of Information Technology and Quantitative Sciences 2005
Online Access:http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf
http://ir.uitm.edu.my/id/eprint/695/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.695
record_format eprints
spelling my.uitm.ir.6952017-04-28T04:32:27Z http://ir.uitm.edu.my/id/eprint/695/ Covert channel: network steganography deployment Md Ali, Nurul Majdi Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. This project major focus is to deploy steganography on network protocol using covert_TCP tool. This tool uses 3 methods in order to employ steganography at TCP/IP header; IP identification encoding, TCP sequence number encoding and ACK “bouncing” server method. We also employ network steganography in two different network environment which is on transmission on single host (loopback interface) and inter local area network. After that phase, we analyze packet income and out the network. We used network sniffer tool, tcpdump to dump all the packet and analyze the accuracy of the data transmit using covert channel as employ by covert_TCP. Faculty of Information Technology and Quantitative Sciences 2005 Student Project NonPeerReviewed text en http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf Md Ali, Nurul Majdi (2005) Covert channel: network steganography deployment. [Student Project] (Unpublished)
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
description Steganography is one of the major techniques used to hide the existence of communication that lies between two overt parties. Steganography also denoted by art of hiding communication. This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. This project major focus is to deploy steganography on network protocol using covert_TCP tool. This tool uses 3 methods in order to employ steganography at TCP/IP header; IP identification encoding, TCP sequence number encoding and ACK “bouncing” server method. We also employ network steganography in two different network environment which is on transmission on single host (loopback interface) and inter local area network. After that phase, we analyze packet income and out the network. We used network sniffer tool, tcpdump to dump all the packet and analyze the accuracy of the data transmit using covert channel as employ by covert_TCP.
format Student Project
author Md Ali, Nurul Majdi
spellingShingle Md Ali, Nurul Majdi
Covert channel: network steganography deployment
author_facet Md Ali, Nurul Majdi
author_sort Md Ali, Nurul Majdi
title Covert channel: network steganography deployment
title_short Covert channel: network steganography deployment
title_full Covert channel: network steganography deployment
title_fullStr Covert channel: network steganography deployment
title_full_unstemmed Covert channel: network steganography deployment
title_sort covert channel: network steganography deployment
publisher Faculty of Information Technology and Quantitative Sciences
publishDate 2005
url http://ir.uitm.edu.my/id/eprint/695/1/PPb_NURUL%20MAJDI%20MD%20ALI%20CS%2006_5.pdf
http://ir.uitm.edu.my/id/eprint/695/
_version_ 1685648082011684864
score 13.211869