A Method of Detecting Storage Based Network Steganography Using Machine Learning

被引:9
作者
Cho, D. X. [1 ,2 ]
Thuong, D. T. H. [1 ]
Dung, N. K. [3 ]
机构
[1] Posts & Telecommun Inst Technol Hanoi, Informat Secur Dept, Hanoi, Vietnam
[2] FPT Univ, Informat Secur Dept, Hanoi, Vietnam
[3] Thank Dong Univ, Informat Technol Dept, Hanoi, Vietnam
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY [ICICT-2019] | 2019年 / 154卷
关键词
Information Security; network steganography; detection storage based network steganography; machine learning;
D O I
10.1016/j.procs.2019.06.086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the techniques of network steganography are widely applied. In addition to the outstanding advantages about the ability to hide and transmit secret information, it has a huge disadvantage that is being exploited by hackers to transmit information or communicate with the control host. Network steganography storage method is one of the network steganography techniques that is being much applied. Due to the characteristics of the storage based network steganography are different from other network steganography techniques, the detection of this techniques is difficult. The traditional tools and methods used to detect steganography are difficult to detect the signs of steganographic packets that use this technique. Therefore, in this paper, the authors propose using machine learning to detect abnormal behavior of steganographic packets. (C) 2019 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
[21]   Detecting A Twitter Cyberbullying Using Machine Learning [J].
Dalvi, Rahul Ramesh ;
Chavan, Sudhanshu Baliram ;
Halbe, Apama .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, :297-301
[22]   Detecting Malicious URLs Using Machine Learning [J].
Bat-Erdene, Munkhbayar ;
Buyantur, Oyuntungalag ;
Batbayar, Densmaa ;
Dondogmegd, Byambadorj ;
Choi, Juhee .
JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2025,
[23]   A machine learning-based intrusion detection for detecting internet of things network attacks [J].
Saheed, Yakub Kayode ;
Abiodun, Aremu Idris ;
Misra, Sanjay ;
Holone, Monica Kristiansen ;
Colomo-Palacios, Ricardo .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) :9395-9409
[24]   Detecting Phishing Domains Using Machine Learning [J].
Alnemari, Shouq ;
Alshammari, Majid .
APPLIED SCIENCES-BASEL, 2023, 13 (08)
[25]   Detecting Phishing Website Using Machine Learning [J].
Alkawaz, Mohammed Hazim ;
Steven, Stephanie Joanne ;
Hajamydeen, Asif Iqbal .
2020 16TH IEEE INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2020), 2020, :111-114
[26]   Detecting machine chatter using audio data and machine learning [J].
Kvinevskiy, Ilarion ;
Bedi, Sanjeev ;
Mann, Stephen .
INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2020, 108 (11-12) :3707-3716
[27]   Detecting machine chatter using audio data and machine learning [J].
Ilarion Kvinevskiy ;
Sanjeev Bedi ;
Stephen Mann .
The International Journal of Advanced Manufacturing Technology, 2020, 108 :3707-3716
[28]   A Machine Learning Method for Detecting the Trace of Seam Carving [J].
Senturk, Zehra Karapinar ;
Akgun, Devrim .
ELEKTRONIKA IR ELEKTROTECHNIKA, 2021, 27 (05) :59-66
[29]   Comparison of Machine Learning Algorithms Performance in Detecting Network Intrusion [J].
Abd Jalil, Kamarularifin ;
Kamarudin, Muhammad Hilmi ;
Masrek, Mohamad Noorman .
2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, :221-226
[30]   Perspective Analysis of Machine Learning Algorithms for Detecting Network Intrusions [J].
Nadiammai, G. V. ;
Hemalatha, M. .
2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,