ANALYSIS OF THE CURRENT STATE OF HIDDEN DATA TRANSMISSION IN THE PUBLIC INFORMATION TELECOMMUNICATIONS NETWORK

Authors

  • Valerii Chystov Ivan Kozhedub Kharkiv National University of the Air Force
  • Kostyantyn Vasiuta Ivan Kozhedub Kharkiv National University of the Air Force

DOI:

https://doi.org/10.31649/1999-9941-2022-54-2-61-67

Keywords:

information and telecommunication networks, network steganography, protocol, datagram, TCP/IP stack

Abstract

Recently, network steganography methods based on the use of structural properties of OSI (Open System Interconnection) protocols have been widely used to mask the fact of information transmission in information and telecommunication networks. This allows to covertly transmit important data based on background traffic, without significantly reducing the data rate in the base (open) channel. With the correct choice of properties (groups of properties) of the protocol (protocols) of the OSI model, the methods of network steganography do not allow the steganoanalyst to detect the fact of hidden data transmission. In network steganography, the process of detecting hidden data transmission is based on the analysis of the protocol characteristics of the used protocols of the OSI model for compliance with standards.

When using protocols of channel and network levels of the OSI model, as a technological basis for organizing a hidden data transmission channel, concealment is carried out by placing data, the fact of transmission of which must be hidden, in the visible fields of the headers of the corresponding protocols, i.e. in open form. Due to the fact that the IP encryption technology covers only the payload of network layer protocols, it is advisable to use transport layer protocols of the OSI model. At this level, the TCP protocol is the most common, and it is standardized and used by opposing parties, including the military. The paper analyzes the current state of hidden data transmission in public information telecommunications networks and methods of steganographic data transmission in information and telecommunications networks. The network protocols used in information telecommunication networks were also analyzed, the concept of "network steganography" was revealed, the main task of which is to hide the very fact of message transmission in data transmission channels.

Author Biographies

Valerii Chystov, Ivan Kozhedub Kharkiv National University of the Air Force

adjunct of the scientific and organizational department of the Ivan Kozhedub Kharkiv National University of the Air Force

Kostyantyn Vasiuta, Ivan Kozhedub Kharkiv National University of the Air Force

doctor of  technical sciences, professor, deputy head of educational work of the Ivan Kozhedub Kharkiv National University of the Air Force

References

W. Mazurczyk, K. Szczypiorski, “Steganography of VoIP Streams,” Warsaw University of Technolo-gy, Faculty of Electronics and Information Technology, Institute of Telecommunications. [Online]. Available: http://arxiv.org/pdf/0805.2938v1/. Accessed on: May 14, 2022.

K. Szczypiorski, “HICCUPS: Hidden Communication System for Corrupted Networks,” Warsaw University of Technology, Institute of Telecommunications. [Online]. Available: https://goo.gl/ZU9tDM. Accessed on: May 4, 2022.

D. Kundur, K. Ahsan, “Practical Internet Steganography: Data Hiding in IP,” Proc. Texas Wksp. Secu-rit of Information Systems, Apr. 2003. [Online]. Available: http://arxiv.org/pdf/1207.0917.pdf. Ac-cessed on: October 10, 2021.

E. Cauich, R. Gómez Cárdenas, R. Watanabe, “Data Hiding in Identification and Offset IP Fields,” in Proceedings of 5th International School and Symposium of Advanced Distributed Systems (ISSADS), jan. 2005, pp. 118-125. [Online]. Available: https://goo.gl/2bjjXZ. Accessed on: October 29, 2021.

Theodore G. Handel, Maxwell T. Sandford II, Hiding data in the OSI network model. [Online]. Available: https://goo.gl/hz8X1m. Accessed on: September 20, 2021.

O. Y. Peskova, G. Y. Halaburda, “Primenenie setevoj steganografii dlya zashchity dannyh, kotorye peredayutsya po otkrytym kanalam Internet,” Conference “ Internet i sovremennoe obshchestvo”. [Online]. Available: https://goo.gl/qtC7D3. Accessed on: Aug. 19.2021 [in Russian].

E. O. Savateev, “Postroenie steganograficheskoj sistemy na baze protokola IPv4,” [Online]. Available: https://goo.gl/wUogUB. Accessed on: Aug. 30.2021 [in Russian].

“Internet protocol – DARPA Internet Program Protocol Specification”. RFC-768. User Datagram Protocol, 28 August 1980. [Online]. Available: https://tools.ietf.org/html/rfc768. Accessed on: Octo-ber 22, 2021.

“Internetprotocol – DARPA Internet Program Protocol Specification” RFC-791 USC / Information Sciences Institute, September 1981 [Online]. Available: http://www.rfc-base.org/txt/rfc-791.txt. Ac-cessed on: October 21, 2021.

“Internet protocol – DARPA Internet Program Protocol Specification” RFC-793 USC / Transmission control protocol, September 1981 [Online]. Available: https://tools.ietf.org/html/rfc793. Accessed on: October 21, 2021.

V. P. Orlov, “Metody skrytoj peredachi informacii v telekomunikacionnyh setyah”, cand. of technical sciences thesis: 05.12.13. Samara, 2012 [in Russian].

Downloads

Abstract views: 216

Published

2022-06-29

How to Cite

[1]
V. Chystov and K. Vasiuta, “ANALYSIS OF THE CURRENT STATE OF HIDDEN DATA TRANSMISSION IN THE PUBLIC INFORMATION TELECOMMUNICATIONS NETWORK”, ІТКІ, vol. 54, no. 2, pp. 61–67, Jun. 2022.

Issue

Section

Information technology and coding theory

Metrics

Downloads

Download data is not yet available.