Skip to main content

Hiding data in the OSI network model

  • Conference paper
  • First Online:
Information Hiding (IH 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1174))

Included in the following conference series:

Abstract

Rather than searching for the holy grail of steganography, this paper presents the basis for development of a tool kit for creating and exploiting hidden channels within the standard design of network communications protocols. The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem. Descriptions of typical hidden channel design for each layer of the Open Systems Interconnect (OSI) network model are given. Methods of hiding and detection probabilities are summarized. Denying Bob and Alice the ability to communicate electronically may be the only absolute solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Schneier, Bruce. Applied Cryptography Second Ed., J Wiley & Sons, 1996

    Google Scholar 

  • Jamsa, et al. Internet Programming, Jamsa Press, 1995

    Google Scholar 

  • Novell, Inc. Networking Technologies, Novell Press, 1992

    Google Scholar 

  • Connally, D.R., et. al. Windows 3.1 Connectivity Secrets. IDG Books, 1994

    Google Scholar 

  • Bhargava, V.K. et. al. Digital Communications by Satellite, J Wiley & Sons, 1981

    Google Scholar 

  • Sandford, M.T., Handel, T.G., and Bradley, J.N., The Data Embedding Method, proc. SPIE Photonics East, 22–24 Oct., 1995. Available electronically in PostScript format from: http://info-server.lanl.gov:52271/usr/u078743/embedl.htm

    Google Scholar 

  • ftp://nic.ddn.mil/rfc Complete Internet Specification Archive rfc-index.txt — Index of documents (234 Kb) rfc1780.txt — Official Internet Protocol (84 Kb)

    Google Scholar 

Additional Reading

  • Tomassini, Marco. 1991, “Programming with Sockets.” The C Users Journal Volume 9 (September 1991): 39–56.

    Google Scholar 

  • Baker, M. Steven. 1992. “Network Delivers.” “Windows Tech Journal”, Volume 1 (August 1992): 22–29.

    Google Scholar 

  • Volkman, Victor R. 1992. “Plug into TCP/IP with Windows Sockets.” Windows/DOS Developer's Journal Volume 3 (December 1992): 6–17.

    Google Scholar 

  • Calbaum, Mike; Porcarro, Frank; Ruegsegger, Mark; Backman, Bruce. 1993. “Untangling the Windows Sockets API.” Dr. Dobb's Journal Volume 18 (February 1993): 66–71.

    Google Scholar 

  • Jablon, David P. 1994. “Windows Sockets.” UNIX Review Volume 12 (October 1994): 37–44.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ross Anderson

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Handel, T.G., Sandford, M.T. (1996). Hiding data in the OSI network model. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-61996-8_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61996-3

  • Online ISBN: 978-3-540-49589-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics