Abstract
Steganography is one of the techniques used both to leak information and to prevent theft and distortion of confidential information. Covert channels in the network are one of the platforms for information steganography in the network. Often, this method is realized using the network's protocols. Network protocols are used as an information transfer medium. Network protocols can contain critical information and carry them into the network without attracting consideration. Covert channels are evaluated with three different criteria including capacity, robustness, and insensitivity. Also, the methods to deal with it include removing, limiting, and diagnosing the channel. By definition, covert channels are used to realize covert communication. Steganography methods are safe if the stego has no detectable signatures. Put differently, the stego statistical properties (audio, image, and video) should be similar to the cover properties. The ability to discover the message in the stego depends on the length of the hidden message. The proposed method in this study is to consider the amount of redundant information in a repository, explore the discoverable signs of the covert channel, and check the packet length in the checksum field in the UDP protocol at the transmission layer.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.