Abstract
Rather than searching for the holy grail of steganography, this paper presents the basis for development of a tool kit for creating and exploiting hidden channels within the standard design of network communications protocols. The Alice and Bob analogy, derived from cryptology, is used to present network protocols in a way that more clearly defines the problem. Descriptions of typical hidden channel design for each layer of the Open Systems Interconnect (OSI) network model are given. Methods of hiding and detection probabilities are summarized. Denying Bob and Alice the ability to communicate electronically may be the only absolute solution.
Preview
Unable to display preview. Download preview PDF.
References
Schneier, Bruce. Applied Cryptography Second Ed., J Wiley & Sons, 1996
Jamsa, et al. Internet Programming, Jamsa Press, 1995
Novell, Inc. Networking Technologies, Novell Press, 1992
Connally, D.R., et. al. Windows 3.1 Connectivity Secrets. IDG Books, 1994
Bhargava, V.K. et. al. Digital Communications by Satellite, J Wiley & Sons, 1981
Sandford, M.T., Handel, T.G., and Bradley, J.N., The Data Embedding Method, proc. SPIE Photonics East, 22–24 Oct., 1995. Available electronically in PostScript format from: http://info-server.lanl.gov:52271/usr/u078743/embedl.htm
ftp://nic.ddn.mil/rfc Complete Internet Specification Archive rfc-index.txt — Index of documents (234 Kb) rfc1780.txt — Official Internet Protocol (84 Kb)
Additional Reading
Tomassini, Marco. 1991, “Programming with Sockets.” The C Users Journal Volume 9 (September 1991): 39–56.
Baker, M. Steven. 1992. “Network Delivers.” “Windows Tech Journal”, Volume 1 (August 1992): 22–29.
Volkman, Victor R. 1992. “Plug into TCP/IP with Windows Sockets.” Windows/DOS Developer's Journal Volume 3 (December 1992): 6–17.
Calbaum, Mike; Porcarro, Frank; Ruegsegger, Mark; Backman, Bruce. 1993. “Untangling the Windows Sockets API.” Dr. Dobb's Journal Volume 18 (February 1993): 66–71.
Jablon, David P. 1994. “Windows Sockets.” UNIX Review Volume 12 (October 1994): 37–44.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handel, T.G., Sandford, M.T. (1996). Hiding data in the OSI network model. In: Anderson, R. (eds) Information Hiding. IH 1996. Lecture Notes in Computer Science, vol 1174. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-61996-8_29
Download citation
DOI: https://doi.org/10.1007/3-540-61996-8_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61996-3
Online ISBN: 978-3-540-49589-5
eBook Packages: Springer Book Archive