Abstract
Protocol steganography allows users who wish to communicate secretly to embed information within other messages and network control protocols used by common applications. This form of unobservable communication can be used as means to enhance privacy and anonymity as well as for many other purposes, ranging from entertainment to protected business communication or national defense. In this paper, we describe our approach to application-layer protocol steganography, describing how we can embed messages into a commonly used TCP/IP protocol. We also introduce the notions of syntax and semantics preservation, which ensure that messages after embedding still conform to the host protocol. Based on those concepts, we attempt to produce reasonably secure and robust stegosystems. To demonstrate the efficacy of our approach, we have implemented protocol steganography within the Secure Shell (SSH) protocol. Findings indicate that protocol steganographic system is reasonably secure if the statistical profile of the covermessages and the statistical profile of its traffic match their counterparts after embedding.
This work was supported in part by the State of New York, the CASE Center’s SUPRIA program at Syracuse University, and the Air Force Research Laboratory (AFRL).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Katzenbeisser, S., Petitcolas, F.A.: Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood (2000)
Johnson, N.F., Jajodia, S.: Steganalysis: The investigation of hidden information. In: Proceedings of the IEEE Information Technology Conference, Syracuse, New York, USA, pp. 113–116 (1998)
Anderson, R. (ed.): IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)
Aucsmith, D. (ed.): IH 1998. LNCS, vol. 1525, p. 1. Springer, Heidelberg (1998)
Moskowitz, I.S. (ed.): IH 2001. LNCS, vol. 2137. Springer, Heidelberg (2001)
Oostveen, J. (ed.): Information Hiding. Preproceedings of the Fifth International Workshop, Noordwijkerhout, The Netherlands (2002)
Pfitzmann, A. (ed.): Information Hiding. Proceedings of the Third International Workshop, Dresden, Germany. LNCS, vol. 1768. Springer, Heidelberg (1999)
Chapin, S.J., Ostermann, S.: Information hiding through semantics-preserving application-layer protocol steganography. Technical report, Center for Systems Assurance, Syracuse University (2002)
Kemmerer, R.: A practical approach to identify storage and timing channels: Twenty years later. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), San Diego, California, pp. 109–118 (2002)
Dunigan, T.: Internet steganography. Technical report, Oak Ridge National Laboratory (Contract No. DE-AC05-96OR22464), Oak Ridge, Tennessee (1998) [ORNL/TM-limited distribution]
Handel, T., Sandford, M.: Hiding data in the OSI network model. In: Anderson, R. (ed.) Information Hiding: Proceedings of the First International Workshop, Cambridge, U.K, pp. 23–38. Springer, Heidelberg (1996)
route@infonexus.com, alhambra@infornexus.com: Article 6. Phrack Magazine, 49 (1996), Retrieved on (August 27, 2002) from the World Wide Web: http://www.phrack.com/phrack/49/P49-06
Rowland, C.H.: Covert channels in the TCP/IP protocol suite. Psionics Technologies (1996), Retrieved on August 23 (2002) from the World Wide Web: http://www.psionic.com/papers/whitep03.html
CAIDA.org: Characterization of internet traffic loads, segregated by application - OC48 analysis (2002), Retrieved on October 15 (2003) from the World Wide Web: http://www.caida.org/analysis/workload/byapplication/oc48/20020305/appsperc20020305/index.xml
Katzenbeisser, S., Petitcolas, F.A.: Defining security in steganographic systems. In: Electronic Imaging, Photonics West (SPIE). Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 50–56 (2002)
Moskowitz, I.S., Longdon, G.E., WuChang, L.: A new paradigm hidden in steganography. In: Proceedings of the New Security Paradigm Workshop, Cork, Ireland, pp. 41–50 (2000)
Cachin, C.: An information-theoreic model for steganography. Technical Report Report 2000/028 (2002), http://www.zurich.ibm.com/cca/papers/stego.pdf
Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal of Selected Areas in Communications 16, 474–481 (1998)
Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–16. Springer, Heidelberg (1999)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 344–354. Springer, Heidelberg (1998)
Ettinger, J.M.: Steganalysis and game equilibria. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 319–328. Springer, Heidelberg (1998)
Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77–92. Springer, Heidelberg (2002)
Reyzin, L., Russell, S.: More efficient provably secure steganography. Cryptology ePrint Archive: Report 2003/093 (2003), http://eprint.iacr.org/2003/093/
Fridrich, J., Goljan, M.: Practical steganalysis of digital images - state of the art. In: Proceedings of the SPIE Photonics West (Security and Watermarking of Multimedia Contents IV), San Jose, California, USA, vol. 4675, pp. 1–13 (2002)
Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Security & Privacy Magazine 1, 32–44 (2003)
Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Proceedings of CRYPTO 1983, pp. 51–67. Plenum Press, New York (1983)
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1996)
Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding. Proceedings of the First International Workshop, pp. 347–349. Springer, Cambridge (1996)
Korn, F., Muthukrishnan, S., Zhu, Y.: Ipsofacto: A visual correlation tool for aggregate network traffic data. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, California. Demonstration Session, pp. 677–677. ACM Press, New York (2003)
Ka0ticSH: Diggin em walls (part 3) - advanced/other techniques for bypassing firewalls. New Order (2002), Retrieved on August 28 (2002) from the World Wide Web: http://neworder.box.sk/newsread.php?newsid=3957
Fisk, G., Fisk, M., Papadopoulos, C., Neil, J.: Eliminating steganography in Internet traffic with active wardens. In: Oostveen, J. (ed.) Information Hiding. Preproceedings of the Fifth International Workshop, Noordwijkerhout, The Netherlands, pp. 29–46. Springer, Heidelberg (2002)
Bowyer, L.: Firewall bypass via protocol steganography. Network Penetration (2002), Retrieved on January 05 (2003) from the World Wide Web: http://www.networkpenetration.com/protocolsteg.html
Bauer, M.: New covert channels in HTTP - adding unwitting web browsers to anonymity sets. In: Samarati, P., Syverson, P. (eds.) Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, pp. 72–78. ACM Press, New York (2003) ISBN 1-58113-776-1
Secure Shell Working Group, I.E.T.F.I.: The secure shell (2003), Retrieved on October 26 (2003) from the World Wide Web: http://www.ietf.org/html.charters/secshcharter.html
Barrett, D.J., Silverman, R.: SSH. In: The Secure Shell: The Definitive Guide, O’Reilly, Sebastopol (2001)
Watterson, B.: Something Under the Bed is Drooling. Andrews and McMeel, Kansas City, MO, pp. 101–104 (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lucena, N.B., Pease, J., Yadollahpour, P., Chapin, S.J. (2004). Syntax and Semantics-Preserving Application-Layer Protocol Steganography. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)