skip to main content
10.1145/3600160.3605058acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A Survey of Steganography Tools at Layers 2-4 and HTTP

Published:29 August 2023Publication History

ABSTRACT

Steganography has evolved into various forms and remains an effective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as terrorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several techniques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.

References

  1. Osamah Ibrahiem Abdullaziz, Vik Tor Goh, Huo-Chong Ling, and KokSheik Wong. 2013. Network packet payload parity based steganography. In 2013 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (CSUDET). IEEE, 56–59.Google ScholarGoogle ScholarCross RefCross Ref
  2. Punam Bedi and Arti Dua. 2020. Network steganography using the overflow field of timestamp option in an IPv4 packet. Procedia Computer Science 171 (2020), 1810–1818.Google ScholarGoogle ScholarCross RefCross Ref
  3. Michele Ceccarelli. 2022. Un nuovo approccio alla steganografia di rete basato sugli header HTTP. Master’s thesis. University of Perugia.Google ScholarGoogle Scholar
  4. daemon9. 1996. Project Loki. Phrack Magazine 49 (1996).Google ScholarGoogle Scholar
  5. daemon9. 1997. Project Loki. Phrack Magazine 51 (1997).Google ScholarGoogle Scholar
  6. Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, and David Karger. 2002. Infranet: Circumventing web censorship and surveillance. In 11th USENIX Security Symposium (USENIX Security 02).Google ScholarGoogle Scholar
  7. Ricardo André Santana Gonçalves. 2011. A MAC layer covert channel in 802.11 networks. Ph. D. Dissertation. Monterey, California: Naval Postgraduate School.Google ScholarGoogle Scholar
  8. Van Hauser. 1999. Placing backdoors through firewalls. WindowsSecuriy.com, May (1999).Google ScholarGoogle Scholar
  9. Amir Houmansadr, Giang TK Nguyen, Matthew Caesar, and Nikita Borisov. 2011. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 18th ACM conference on Computer and communications security. 187–200.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. David Llamas, C Allison, and A Miller. 2005. Covert channels in internet protocols: A survey. In Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Vol. 2005.Google ScholarGoogle Scholar
  11. Wojciech Mazurczyk and Steffen Wendzel. 2017. Information Hiding: Challenges for Forensic Experts. Commun. ACM 61, 1 (dec 2017), 86–94. https://doi.org/10.1145/3158416Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Birgit Pfitzmann. 1996. Information hiding terminology. In Information Hiding: First International Workshop Proceedings, 1996. Springer.Google ScholarGoogle Scholar
  13. Jason Reaves. 2018. Covert channel by abusing x509 extensions. viXra.org (2018).Google ScholarGoogle Scholar
  14. Jun O Seo, Sathiamoorthy Manoharan, and Aniket Mahanti. 2016. A discussion and review of network steganography. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 384–391.Google ScholarGoogle Scholar
  15. Jianjun Shen, Sihan Qing, Qingni Shen, and Liping Li. 2005. Optimization of Covert Channel Identification. In 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA. IEEE Computer Society, 95–108. https://doi.org/10.1109/SISW.2005.9Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Harjit Singh. 2016. Analysis of different types of steganography. International journal of scientific research in science, engineering and technology 2 (2016), 578–582.Google ScholarGoogle Scholar
  17. Aron J Smith-Donovan. 2022. Passing Time and Syncing Secrets: Demonstrating Covert Channel Vulnerabilities in Precision Time Protocol (PTP). Mathematics, Statistics, and Computer Science Honors Projects (2022).Google ScholarGoogle Scholar
  18. Krzysztof Szczypiorski. 2003. Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System-HICCUPS. Warsaw University of Technology, Poland Institute of Telecommunications, Warsaw, Poland (2003).Google ScholarGoogle Scholar
  19. vecna. 2000. B0CK. Butchered From Inside (2000).Google ScholarGoogle Scholar
  20. Arne Vidstrom. 2000. ACK Tunneling Trojans. (2000). Covert shell through TCP ACK.Google ScholarGoogle Scholar
  21. Steffen Wendzel. 2008. Protocol channels as a new design alternative of covert channels. Technical Report. CERN.Google ScholarGoogle Scholar
  22. Sebastian Zander, Grenville Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007), 44–57.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sebastian Zander, Grenville J. Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9, 1-4 (2007), 44–57. https://doi.org/10.1109/COMST.2007.4317620Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Xiao-Guang Zhang, Guang-Hong Yang, and Xiu-Xiu Ren. 2022. Network steganography based security framework for cyber-physical systems. Information Sciences 609 (2022), 963–983.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Sebastian Zillien and Steffen Wendzel. 2021. Reconnection-Based Covert Channels in Wireless Networks. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 118–133.Google ScholarGoogle Scholar

Index Terms

  1. A Survey of Steganography Tools at Layers 2-4 and HTTP

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
          August 2023
          1440 pages
          ISBN:9798400707728
          DOI:10.1145/3600160

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 August 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate228of451submissions,51%
        • Article Metrics

          • Downloads (Last 12 months)47
          • Downloads (Last 6 weeks)5

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format