Security

Towards Steganography Detection Through Network Traffic Visualisation

Free registration required

Executive Summary

The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations. The method's feasibility is demonstrated in network steganography environment by presenting stegtomography methodology and developing the dedicated visualisation tool. To authors' best knowledge this is the first utilization of network traffic visualisations for steganalysis purposes. Anomalies in network traffic can be caused by malicious actions that might compromise network security. Thus, anomaly detection methods in telecommunication networks focus on finding illegal activities/events, especially those that can be caused by potential attacker/intruder.

  • Format: PDF
  • Size: 923.32 KB