Novel network steganography approaches for confidential transmission of information
dc.authorscopusid | 56780485400 | |
dc.authorscopusid | 24450038800 | |
dc.authorscopusid | 6602929072 | |
dc.contributor.author | Karado?an I. | |
dc.contributor.author | Daş R. | |
dc.contributor.author | Karci A. | |
dc.date.accessioned | 2024-08-04T20:03:57Z | |
dc.date.available | 2024-08-04T20:03:57Z | |
dc.date.issued | 2017 | |
dc.department | İnönü Üniversitesi | en_US |
dc.description | 2017 International Artificial Intelligence and Data Processing Symposium, IDAP 2017 -- 16 September 2017 through 17 September 2017 -- 115012 | en_US |
dc.description.abstract | In this paper, two different packet timing and IP ID based network steganography approaches have been proposed to provide confidential transmission of information. In the proposed packet timing approach, it is seen that the bandwidth is higher than the previous methods. The proposed IP ID field based approach has been found to be more effective than previous methods in ensuring the uniqueness of the ID field and is suitable for sending confidential data over the Internet. In addition, comprehensive information on this study was presented by examining methods of information hiding, hidden channels and secret data transmission in the network environment. © 2017 IEEE. | en_US |
dc.identifier.doi | 10.1109/IDAP.2017.8090304 | |
dc.identifier.isbn | 9781538618806 | |
dc.identifier.scopus | 2-s2.0-85039904186 | en_US |
dc.identifier.scopusquality | N/A | en_US |
dc.identifier.uri | https://doi.org/10.1109/IDAP.2017.8090304 | |
dc.identifier.uri | https://hdl.handle.net/11616/92232 | |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | tr | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | IDAP 2017 - International Artificial Intelligence and Data Processing Symposium | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Communication protocols | en_US |
dc.subject | Covert channels | en_US |
dc.subject | Network security | en_US |
dc.subject | Network steganography | en_US |
dc.title | Novel network steganography approaches for confidential transmission of information | en_US |
dc.title.alternative | Bilginin gizli iletimi için yeni a? steganografi yaklaşimlari | en_US |
dc.type | Conference Object | en_US |