ADVANCEMENTS IN RETRANSMISSION STEGANOGRAPHY: AN ENHANCED ALGORITHM AND ITS STEGANALYSIS APPROACHES
Keywords:
Synchronized, thereby significantly enhancing, RSTEGAbstract
Network steganography, also known as a covert communication channel within a network, is a discrete method for secretly transmitting confidential data by exploiting the redundancies found in network protocols. The technique known as retransmission steganography (RSTEG) involves hiding classified information within the payload section of retransmitted packets intentionally generated by the communicating parties. However, this method overlooks the checksum fields in the original packets, resulting in differences between the retransmission packets and compromising its level of secrecy. To address this limitation, we introduce an improved version of the RSTEG algorithm called Enhanced RSTEG (ERSTEG) in this paper. The proposed enhancement ensures that the checksum fields in both the original and retransmission packets are synchronized, thereby significantly enhancing the concealment capabilities of ERSTEG compared to RSTEG.
Downloads
References
Lampson B. Practical principles for computer security //NATO SECURITY THROUGH SCIENCE SERIES D-INFORMATION AND COMMUNICATION SECURITY. – 2007. – Т. 9. – С. 151.
Ma B. et al. Enhancing the security of image steganography via multiple adversarial networks and channel attention modules //Digital Signal Processing. – 2023. – С. 104121.
S. Zandel, G. Armitage, P. Branch. A survey of covert channels and countermeasures in computer network. IEEE Communications. Surveys and Tutorial. 2007, 9(3), pp.44-57.
L. Ji, W. Jiang, B. Dai, X. Niu,A novel covert channel based on length of message. In proceedings of 2009 International symposium on information engineering and electronic commerce. 2009, pp. 445-450.
L. Yao, X. Zi, L. Pan and J. Li. A study of on/off timing channel based on packet delay distribution. Computers & Security, 2009,28(8), pp.785-794.
S. Gianvecchio, H. Wang, D. Wijesekera. Modelbased covert timing channels: automated modeling and evasion. Lecture Notes In Computer Science, 2008, vol.5230, pp.211-230.
W. Mazurczyk, M. Smolarczyk, K. Szczypiorski. Retransmission steganography and its detection. Soft Computing. 2009, 15(3), pp. 505-515.
S. Rewaskar, J. Kaur, F. Smith. A Performance Study of Loss Detection/Recovery in Real-world TCP Implementation. In Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, 2007, pp. 256-265.
W. Mazurczyk, M. Smolarczyk, K. Szczypiorski. Retransmission steganography and its detection. Soft Computing. 2009, 15(3), pp. 505-515.
Kholdinasab N., Amirmazlaghani M. An adversarial learning based image steganography with security improvement against neural network steganalysis //Computers and Electrical Engineering. – 2023. – Т. 108. – С. 108725.
Bedi P., Dua A. Network steganography using the overflow field of timestamp option in an IPv4 packet //Procedia Computer Science. – 2020. – Т. 171. – С. 1810-1818.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Obid Mavlonov

This work is licensed under a Creative Commons Attribution 4.0 International License.
The content published on the International Scientific and Current Research Conferences platform, including conference papers, abstracts, and presentations, is made available under an open-access model. Users are free to access, share, and distribute this content, provided that proper attribution is given to the original authors and the source.