Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/647598.732023guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Eliminating Steganography in Internet Traffic with Active Wardens

Published: 07 October 2002 Publication History

Abstract

Active wardens have been an area of postulation in the community for nearly two decades, but to date there have been no published implementations that can be used to stop steganography as it transits networks. In this paper we examine the techniques and challenges of a high-bandwidth, unattended, real-time, active warden in the context of a network firewall. In particular, we concentrate on structured carriers with objectively defined semantics, such as the TCP/IP protocol suite rather than on the subjective, or unstructured carriers such as images that dominate the information hiding literature. We introduce the concept of Minimal Requisite Fidelity (MRF) as a measure of the degree of signal fidelity that is both acceptable to end users and destructive to covert communications. For unstructured carriers, which lack objective semantics, wardens can use techniques such as adding noise to block subliminal information. However, these techniques can break the overt communications of structured carriers which have strict semantics. We therefore use a specification-based approach to determine MRF. We use MRF to reason about opportunities for embedding covert or subliminal information in network protocols and develop both software to exploit these channels, as well as an active warden implementation that stops them. For unstructured carriers, MRF is limited by human perception, but for structured carriers, well known semantics give us high assurance that a warden can completely eliminate certain subliminal or covert channels.

References

[1]
R. J. Anderson. Stretching the limits of steganography. Springer Lecture Notes in Computer Science , pages 39-48, 1996. Special Issue on Information Hiding.
[2]
R. J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems . John Wiley and Sons, New York, New York, USA, 2001.
[3]
R. J. Anderson and F.A.P. Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications , 16(4):474-481, May 1998. Special Issue on copyright and privacy protection.

Cited By

View all
  1. Eliminating Steganography in Internet Traffic with Active Wardens

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      IH '02: Revised Papers from the 5th International Workshop on Information Hiding
      October 2002
      427 pages
      ISBN:3540004211

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 07 October 2002

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 21 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)NetWardenProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489327(2039-2056)Online publication date: 12-Aug-2020
      • (2019)NetWardenProceedings of the 11th USENIX Conference on Hot Topics in Cloud Computing10.5555/3357034.3357037(2-2)Online publication date: 8-Jul-2019
      • (2019)Exploiting error control in matrix coding-based data hiding over lossy channelJournal of Real-Time Image Processing10.1007/s11554-018-0829-116:3(577-588)Online publication date: 1-Jun-2019
      • (2018)Towards Distributed Network Covert Channels Detection Using Data Mining-based ApproachProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3233264(1-10)Online publication date: 27-Aug-2018
      • (2018)Towards Deriving Insights into Data Hiding Methods Using Pattern-based ApproachProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3233261(1-10)Online publication date: 27-Aug-2018
      • (2017)Information hidingCommunications of the ACM10.1145/315841661:1(86-94)Online publication date: 27-Dec-2017
      • (2016)DAT detectorsSecurity and Communication Networks10.1002/sec.15319:15(3011-3029)Online publication date: 1-Oct-2016
      • (2016)Micro protocol engineering for unstructured carriersSecurity and Communication Networks10.1002/sec.15009:15(2972-2985)Online publication date: 1-Oct-2016
      • (2015)Protection from binary and multi-symbol packet length covert channelsProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2799994(196-202)Online publication date: 8-Sep-2015
      • (2015)Pattern-Based Survey and Categorization of Network Covert Channel TechniquesACM Computing Surveys10.1145/268419547:3(1-26)Online publication date: 1-Apr-2015
      • Show More Cited By

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media