Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment

Journal Title: Engineering, Technology & Applied Science Research - Year 2018, Vol 8, Issue 6

Abstract

Nowadays we are witnessing a total convergence towards a digital world where information is digitized, conveyed and processed using highly developed techniques and tools. The development of broadband networks, including the internet, has made easy the manipulation, transmission and sharing of information. However, new security issues arise and they are particularly related to integrity, confidentiality and traceability of data. Facing this situation, network security has become very important and challenges related to the protection of exchanged data over the internet against unauthorized access and use have increased. In the current work, we propose to implement an optimized steganography technique over TCP/IP protocol [1]. We have also tested it against well-known security equipment using latest versions. We will see that they are inefficient to stop this kind of cover channels. Our work is like an alarm to every IT administrator to change their thinking about data lost prevention (DLP) and exfiltration of sensitive information.

Authors and Affiliations

M. Tarhda, R. E. Gouri, L. Hlou

Keywords

Related Articles

Chaotic Behavior in a Flexible Assembly Line of a Manufacturing System

The purpose of the present work is to study the chaotic behavior in a flexible assembly line of a manufacturing system. A flexible assembly line can accommodate a variety of product types. Result analysis is performed to...

Hydrogen Gas Production in a Stand-Alone Wind Farm

This paper is analyzing the operation of a stand-alone wind farm with variable speed turbines, permanent magnet synchronous generators (PMSG) and a system for converting wind energy during wind speed variations. On this...

Type-2 Fuzzy Logic Controller Based PSS for Large Scale Power Systems Stability

In this paper, the application of the fuzzy logic based power systems stabilizer (FLPSS) to damp power system oscillation is presented. Various types of fuzzy logic controller are used to replace the conventional power s...

Remediation of Sulfidic Wastewater by Aeration in the Presence of Ultrasonic Vibration

In the current study, the aerial oxidation of sodium sulfide in the presence of ultrasonic vibration is investigated. Sulfide analysis was carried out by the methylene blue method. Sodium sulfide is oxidized to elemental...

Comparing the Thixotropic and Lightly Solidified Hardening Behavior of a Dredged Marine Clay

When a soil is disturbed upon remolding, it may lose part or all of its strength. As time passes, the structural arrangement of the soil particles would be restored to a stable form and the soil would regain hardness und...

Download PDF file
  • EP ID EP283657
  • DOI -
  • Views 264
  • Downloads 0

How To Cite

M. Tarhda, R. E. Gouri, L. Hlou (2018). Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment. Engineering, Technology & Applied Science Research, 8(6), -. https://europub.co.uk/articles/-A-283657