skip to main content
10.1145/3600160.3605058acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A Survey of Steganography Tools at Layers 2-4 and HTTP

Published: 29 August 2023 Publication History

Abstract

Steganography has evolved into various forms and remains an effective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as terrorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several techniques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.

References

[1]
Osamah Ibrahiem Abdullaziz, Vik Tor Goh, Huo-Chong Ling, and KokSheik Wong. 2013. Network packet payload parity based steganography. In 2013 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (CSUDET). IEEE, 56–59.
[2]
Punam Bedi and Arti Dua. 2020. Network steganography using the overflow field of timestamp option in an IPv4 packet. Procedia Computer Science 171 (2020), 1810–1818.
[3]
Michele Ceccarelli. 2022. Un nuovo approccio alla steganografia di rete basato sugli header HTTP. Master’s thesis. University of Perugia.
[4]
daemon9. 1996. Project Loki. Phrack Magazine 49 (1996).
[5]
daemon9. 1997. Project Loki. Phrack Magazine 51 (1997).
[6]
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, and David Karger. 2002. Infranet: Circumventing web censorship and surveillance. In 11th USENIX Security Symposium (USENIX Security 02).
[7]
Ricardo André Santana Gonçalves. 2011. A MAC layer covert channel in 802.11 networks. Ph. D. Dissertation. Monterey, California: Naval Postgraduate School.
[8]
Van Hauser. 1999. Placing backdoors through firewalls. WindowsSecuriy.com, May (1999).
[9]
Amir Houmansadr, Giang TK Nguyen, Matthew Caesar, and Nikita Borisov. 2011. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. In Proceedings of the 18th ACM conference on Computer and communications security. 187–200.
[10]
David Llamas, C Allison, and A Miller. 2005. Covert channels in internet protocols: A survey. In Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Vol. 2005.
[11]
Wojciech Mazurczyk and Steffen Wendzel. 2017. Information Hiding: Challenges for Forensic Experts. Commun. ACM 61, 1 (dec 2017), 86–94. https://doi.org/10.1145/3158416
[12]
Birgit Pfitzmann. 1996. Information hiding terminology. In Information Hiding: First International Workshop Proceedings, 1996. Springer.
[13]
Jason Reaves. 2018. Covert channel by abusing x509 extensions. viXra.org (2018).
[14]
Jun O Seo, Sathiamoorthy Manoharan, and Aniket Mahanti. 2016. A discussion and review of network steganography. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 384–391.
[15]
Jianjun Shen, Sihan Qing, Qingni Shen, and Liping Li. 2005. Optimization of Covert Channel Identification. In 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA. IEEE Computer Society, 95–108. https://doi.org/10.1109/SISW.2005.9
[16]
Harjit Singh. 2016. Analysis of different types of steganography. International journal of scientific research in science, engineering and technology 2 (2016), 578–582.
[17]
Aron J Smith-Donovan. 2022. Passing Time and Syncing Secrets: Demonstrating Covert Channel Vulnerabilities in Precision Time Protocol (PTP). Mathematics, Statistics, and Computer Science Honors Projects (2022).
[18]
Krzysztof Szczypiorski. 2003. Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System-HICCUPS. Warsaw University of Technology, Poland Institute of Telecommunications, Warsaw, Poland (2003).
[19]
vecna. 2000. B0CK. Butchered From Inside (2000).
[20]
Arne Vidstrom. 2000. ACK Tunneling Trojans. (2000). Covert shell through TCP ACK.
[21]
Steffen Wendzel. 2008. Protocol channels as a new design alternative of covert channels. Technical Report. CERN.
[22]
Sebastian Zander, Grenville Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007), 44–57.
[23]
Sebastian Zander, Grenville J. Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9, 1-4 (2007), 44–57. https://doi.org/10.1109/COMST.2007.4317620
[24]
Xiao-Guang Zhang, Guang-Hong Yang, and Xiu-Xiu Ren. 2022. Network steganography based security framework for cyber-physical systems. Information Sciences 609 (2022), 963–983.
[25]
Sebastian Zillien and Steffen Wendzel. 2021. Reconnection-Based Covert Channels in Wireless Networks. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 118–133.

Cited By

View all
  • (2024)A TCP-based covert channel with integrity check and retransmissionInternational Journal of Information Security10.1007/s10207-024-00879-z23:6(3481-3512)Online publication date: 12-Aug-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
August 2023
1440 pages
ISBN:9798400707728
DOI:10.1145/3600160
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Steganography
  2. covert channels
  3. cyberattacks

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2023

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)46
  • Downloads (Last 6 weeks)10
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A TCP-based covert channel with integrity check and retransmissionInternational Journal of Information Security10.1007/s10207-024-00879-z23:6(3481-3512)Online publication date: 12-Aug-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media