Warsaw University of Technology

Displaying 1-16 of 16 results

  • White Papers // Aug 2012

    Towards Steganography Detection Through Network Traffic Visualisation

    The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations. The method's feasibility is demonstrated in network steganography environment by presenting...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Sending Hidden Data Via Google Suggest

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Is Cloud Computing Steganography-Proof?

    The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security the authors move to brief description of steganography. In particular they introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver....

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Lost Audio Packets Steganography: The First Practical Evaluation

    This paper presents first experimental results for an IP telephony-based steganographic method called LACK (Lost Audio PaCKets steganography). This method utilizes the fact that in typical multimedia communication protocols like RTP (Real-Time Transport Protocol), excessively delayed packets are not used for the reconstruction of transmitted data at the receiver, i.e....

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    How Hidden Can be Even More Hidden?

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. The authors define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each...

    Provided By Warsaw University of Technology

  • White Papers // Apr 2011

    Statistical Mechanics Of The International Trade Network

    Analyzing real data on international trade covering the time interval 1950-2000, the authors show that in each year over the analyzed period the network is a typical representative of the ensemble of maximally random weighted networks, who's directed connections (bilateral trade volumes) are only characterized by the product of the...

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    On Steganography in Lost Audio Packets

    The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence...

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    Multi-Level Steganography: Improving Hidden Communication in Networks

    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a...

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    Steganography in Handling Oversized IP Packets

    This paper identifies new class of network steganography methods that utilize mechanisms to handle oversized packets in IP networks: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, the authors propose two new steganographic methods and two extensions of existing ones. They show how...

    Provided By Warsaw University of Technology

  • White Papers // Sep 2010

    Adaptation of the Neural Network-Based IDS to New Attacks Detection

    In this paper the authors report the experiment concerning new attacks detection by a neural network-based Intrusion Detection System. What is crucial for this topic is the adaptation of the neural network that is already in use to correct classification of a new "Normal traffic" and of an attack representation...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2010

    Information Hiding Using Improper Frame Padding

    Hiding information in network traffic may lead to leakage of confidential information. In this paper the authors introduce a new steganographic system: the PadSteg (Padding Steganography). To their best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2010

    Retransmission Steganography Applied

    This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be...

    Provided By Warsaw University of Technology

  • White Papers // Jun 2010

    Hiding Data in OFDM Symbols of IEEE 802.11 Networks

    This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov model, previously introduced and validated by the authors,...

    Provided By Warsaw University of Technology

  • White Papers // May 2010

    Stream Control Transmission Protocol Steganography

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HPUX or Sun Solaris. It is also supported in...

    Provided By Warsaw University of Technology

  • White Papers // Feb 2010

    What are Suspicious VoIP Delays?

    Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden communication may pose security concerns as it can lead to confidential information leakage. In VoIP, RTP (Real-time Transport Protocol) in...

    Provided By Warsaw University of Technology

  • White Papers // Nov 2008

    LACK - A VoIP Steganographic Method

    The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data...

    Provided By Warsaw University of Technology

  • White Papers // Nov 2008

    LACK - A VoIP Steganographic Method

    The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2010

    Information Hiding Using Improper Frame Padding

    Hiding information in network traffic may lead to leakage of confidential information. In this paper the authors introduce a new steganographic system: the PadSteg (Padding Steganography). To their best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols...

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    Multi-Level Steganography: Improving Hidden Communication in Networks

    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    How Hidden Can be Even More Hidden?

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. The authors define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Sending Hidden Data Via Google Suggest

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2010

    Retransmission Steganography Applied

    This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be...

    Provided By Warsaw University of Technology

  • White Papers // May 2010

    Stream Control Transmission Protocol Steganography

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HPUX or Sun Solaris. It is also supported in...

    Provided By Warsaw University of Technology

  • White Papers // Aug 2012

    Towards Steganography Detection Through Network Traffic Visualisation

    The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations. The method's feasibility is demonstrated in network steganography environment by presenting...

    Provided By Warsaw University of Technology

  • White Papers // Sep 2010

    Adaptation of the Neural Network-Based IDS to New Attacks Detection

    In this paper the authors report the experiment concerning new attacks detection by a neural network-based Intrusion Detection System. What is crucial for this topic is the adaptation of the neural network that is already in use to correct classification of a new "Normal traffic" and of an attack representation...

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    Steganography in Handling Oversized IP Packets

    This paper identifies new class of network steganography methods that utilize mechanisms to handle oversized packets in IP networks: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, the authors propose two new steganographic methods and two extensions of existing ones. They show how...

    Provided By Warsaw University of Technology

  • White Papers // Apr 2011

    Statistical Mechanics Of The International Trade Network

    Analyzing real data on international trade covering the time interval 1950-2000, the authors show that in each year over the analyzed period the network is a typical representative of the ensemble of maximally random weighted networks, who's directed connections (bilateral trade volumes) are only characterized by the product of the...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Is Cloud Computing Steganography-Proof?

    The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security the authors move to brief description of steganography. In particular they introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver....

    Provided By Warsaw University of Technology

  • White Papers // Jun 2010

    Hiding Data in OFDM Symbols of IEEE 802.11 Networks

    This paper presents a new steganographic method called WiPad (Wireless Padding). It is based on the insertion of hidden data into the padding of frames at the physical layer of WLANs (Wireless Local Area Networks). A performance analysis based on a Markov model, previously introduced and validated by the authors,...

    Provided By Warsaw University of Technology

  • White Papers // Jul 2011

    Lost Audio Packets Steganography: The First Practical Evaluation

    This paper presents first experimental results for an IP telephony-based steganographic method called LACK (Lost Audio PaCKets steganography). This method utilizes the fact that in typical multimedia communication protocols like RTP (Real-Time Transport Protocol), excessively delayed packets are not used for the reconstruction of transmitted data at the receiver, i.e....

    Provided By Warsaw University of Technology

  • White Papers // Jan 2011

    On Steganography in Lost Audio Packets

    The paper presents a new hidden data insertion procedure based on estimated probability of the remaining time of the call for steganographic method called LACK (Lost Audio PaCKets steganography). LACK provides hidden communication for real-time services like Voice over IP. The analytical results presented in this paper concern the influence...

    Provided By Warsaw University of Technology

  • White Papers // Feb 2010

    What are Suspicious VoIP Delays?

    Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden communication may pose security concerns as it can lead to confidential information leakage. In VoIP, RTP (Real-time Transport Protocol) in...

    Provided By Warsaw University of Technology