Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2799979.2800024acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Steganographic methods of communications in distributed computing networks

Published: 08 September 2015 Publication History

Abstract

This paper reviews the problem of a secure data transfer in distributed computing networks. It analysis the most popular covert channels (the steganographic methods of communications) and introduces their classification. The article also presents a class of the most effective steganographic methods, describes its formal model and performs a security analysis based on the proposed model.

References

[1]
Zander, S. 2010. Performance of Selected Noisy Covert Channels and Their Countermeasures in IP networks. Ph.D. dissertation, Centre for Advanced Internet Architectures, Swinburne University of Technology.
[2]
Rutkowska, J. 2004. The implementation of Passive Covert Channels in Linux Kernel. In 21st Chaos Communication Congress (Berlin, Germany, December 2004).
[3]
Yuan, B., and Lutz P. 2005. A Covert Channel in Packet Switching Data Networks. In Proceedings of the Second Upstate New York Workshop on Communications and Networking (Rochester, New York, USA, 2005).
[4]
Smeets, M., and Koot, M. 2006. Research Report: Covert Channels. Master's thesis, University of Amsterdam.
[5]
Hoffman, C, Johnson, D., Yuan, B., and Lutz P. 2012. A Covert Channel in TTL Field of DNS Packets. In The 2012 International Conference on Security and Management (Las Vegas, USA, July 16--19, 2012).
[6]
Moghaddam, H. 2013. SkypeMorph: Protocol Obfuscation for Censorship Resistance. Master's thesis, University of Waterloo.
[7]
Cabuk, S., Brodley C., and Shields C. 2004. IP Covert Timing Channels: Design and Detection. In 11th ACM Conference on Computer and Communications Security (New York, USA, 2004).
[8]
Mazurczyk, W., Smolarczyk, M., and Szczypiorski, K. 2010. Retransmission Steganography and Its Detection. In Soft Computing, Journal no. 500 Springer.
[9]
Calhoun, T., Cao, X., Li, Y., and Beyah R. 2012. An 802.11 MAC Layer Covert Channel. In Wireless Communications and Mobile Computing. Volume 12, Issue 5, 393--4005 (April 2012).
[10]
Shah, G., and Blaze, M. 2009. Covert Channels through External Interface. In Proceedings of the 3rd USENIX Conference on Offensive Technologies (Montreal, Canada, July 31-August 04, 2009).
[11]
Blanco, A., and Gutesman E. 2011. Abusing the Windows WiFi Native API to Create a Covert Channel. In Hack.lu (Lexenbourg, September 20, 2011).
[12]
Martins, D., and Guyennet H. 2010. Attacks with Steganography in PHY and MAC Layers of 802.15.2 Protocol. In Systems and Networks Communications.
[13]
Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., and Karger D. 2002. Infranet: Circumventing Web Censorship and Surveillance. In Proceedings of the 11th USENIX Security Symposium (San Francisco, 2002).
[14]
Network Security Computer Appliance "RSCB-X". DOI= http://www.neo-bit.ru/certification.html.
[15]
Markov, Y. A., Kalinin, M. O., and Zegzhda D. P. 2010. A Technique of Abnormal Behavior Detection with Genetic Sequences Alignment Algorithms. In International Conference on Enterprise Information Systems and Web Technologies (Orlando, Florida, USA, July 12-14, 2010).
[16]
Zegzhda, D. P., Kalinin, M. O., Konoplev, A. S., and Dzyoba, A. V. 2012. The High-Performance Cryptographic Gateway for Distributed Systems of Electronic Services. In Information Security Problems. Computer Systems. ISSN 2071-8217.
[17]
Pechenkin, A. I., and Lavrova, D. S. 2013. Parallel Network Traffic Processing on Multiprocessor Clusters for Security Analysis of Transferred Objects. In Information Security Problems. Computer Systems. ISSN 2071-8217.

Cited By

View all
  • (2020)An Approach to Assessing Information Security Effectiveness in Control SystemsAutomatic Control and Computer Sciences10.3103/S014641162008016754:8(879-887)Online publication date: 1-Dec-2020
  • (2020)Invariant Algorithm of Information Concealing for Electrotechnical Systems2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)10.1109/EIConRus49466.2020.9039140(363-365)Online publication date: Jan-2020

Index Terms

  1. Steganographic methods of communications in distributed computing networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
    September 2015
    350 pages
    ISBN:9781450334532
    DOI:10.1145/2799979
    © 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 September 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. covert channel
    2. distributed computing networks
    3. information security
    4. network protocols
    5. steganography
    6. the grid

    Qualifiers

    • Short-paper

    Funding Sources

    • Ministry of Education and Science of the Russian Federation

    Conference

    SIN '15

    Acceptance Rates

    SIN '15 Paper Acceptance Rate 34 of 92 submissions, 37%;
    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)An Approach to Assessing Information Security Effectiveness in Control SystemsAutomatic Control and Computer Sciences10.3103/S014641162008016754:8(879-887)Online publication date: 1-Dec-2020
    • (2020)Invariant Algorithm of Information Concealing for Electrotechnical Systems2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)10.1109/EIConRus49466.2020.9039140(363-365)Online publication date: Jan-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media