A Method of Detecting Storage Based Network Steganography Using Machine Learning

被引:9
作者
Cho, D. X. [1 ,2 ]
Thuong, D. T. H. [1 ]
Dung, N. K. [3 ]
机构
[1] Posts & Telecommun Inst Technol Hanoi, Informat Secur Dept, Hanoi, Vietnam
[2] FPT Univ, Informat Secur Dept, Hanoi, Vietnam
[3] Thank Dong Univ, Informat Technol Dept, Hanoi, Vietnam
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019] | 2019年 / 154卷
关键词
Information Security; network steganography; detection storage based network steganography; machine learning;
D O I
10.1016/j.procs.2019.06.086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the techniques of network steganography are widely applied. In addition to the outstanding advantages about the ability to hide and transmit secret information, it has a huge disadvantage that is being exploited by hackers to transmit information or communicate with the control host. Network steganography storage method is one of the network steganography techniques that is being much applied. Due to the characteristics of the storage based network steganography are different from other network steganography techniques, the detection of this techniques is difficult. The traditional tools and methods used to detect steganography are difficult to detect the signs of steganographic packets that use this technique. Therefore, in this paper, the authors propose using machine learning to detect abnormal behavior of steganographic packets. (C) 2019 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
[11]   SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning [J].
Masubuchi, Yuma ;
Hashimoto, Masaki ;
Otsuka, Akira .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (04) :755-765
[12]   Detecting C&C Server in the APT Attack based on Network Traffic using Machine Learning [J].
Cho Do Xuan ;
Lai Van Duong ;
Nikolaevich, Tisenko Victor .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) :22-27
[13]   Detecting DDoS Attacks in SDN using a Hybrid Method with Entropy and Machine Learning [J].
Santos-Neto, Marcos J. ;
Bordim, Jacir L. ;
Alchieri, Eduardo A. P. ;
Ishikawa, Edison ;
Dourado, Leonardo S. .
2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2022, :248-254
[14]   Predicting and Detecting Coronary Heart Disease in Patients Using Machine Learning Method [J].
Wos, Michal ;
Drop, Bartlomiej ;
Kiczek, Bartlomiej .
BIOINFORMATICS AND BIOMEDICAL ENGINEERING, IWBBIO 2023, PT I, 2023, 13919 :367-377
[15]   Simple method for detecting sleep episodes in rats ECoG using machine learning [J].
Sergeev, Konstantin ;
Runnova, Anastasiya ;
Zhuravlev, Maxim ;
Sitnikova, Evgenia ;
Rutskova, Elizaveta ;
Smirnov, Kirill ;
Slepnev, Andrei ;
Semenova, Nadezhda .
CHAOS SOLITONS & FRACTALS, 2023, 173
[16]   A Machine Learning Method Creating Network Models Based on Measurements [J].
Nilsson, Martin ;
Soder, Lennart ;
Olauson, Jon ;
Eriksson, Robert ;
Nordstrom, Lars ;
Ericsson, Goran N. .
2018 POWER SYSTEMS COMPUTATION CONFERENCE (PSCC), 2018,
[17]   Detecting IoT Botnet in 5G Core Network Using Machine Learning [J].
Kim, Ye-Eun ;
Kim, Min-Gyu ;
Kim, Hwankuk .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (03) :4467-4488
[18]   Detecting Phishing Websites Using Machine Learning [J].
Alswailem, Amani ;
Alabdullah, Bashayr ;
Alrumayh, Norah ;
Alsedrani, Aram .
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
[19]   Detecting Phone Theft Using Machine Learning [J].
Liu, Xinyu ;
Wagner, David ;
Egelman, Serge .
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, :30-36
[20]   Cellular Network Performance using Machine Learning based Quantitative Association Rule Mining Method [J].
Fan, Guanghui ;
Wang, Juan ;
Zhang, Kaixuan ;
Zeng, Jun ;
Gui, Guan .
2020 IEEE 91ST VEHICULAR TECHNOLOGY CONFERENCE, VTC2020-SPRING, 2020,