Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/46432
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTan, Soon Siang.
dc.date.accessioned2011-12-06T02:24:07Z
dc.date.available2011-12-06T02:24:07Z
dc.date.copyright2011en_US
dc.date.issued2011
dc.identifier.urihttp://hdl.handle.net/10356/46432
dc.description.abstractNetwork Steganography describes all the methods used for transmitting data over a network without it being detected. This Final Year Project gives an overview of Network Steganography, introducing the concept of covert channels and network protocols that can be exploited to transmit hidden information. Many network protocols can be manipulated to provide a covert communication channel, such as TCP/IP, UDP, ICMP and HTTP. This report further investigates the existence of covert channels within the TCP/IP protocol suite. The main method approach to achieve this is through packet header manipulation. 3 methods were identified; Modifying the IP Identification field, the TCP Initial Sequence field, and making use of the TCP Sequence field after “bouncing” a packet off a remote server. The last method could allow covert communication even in networks heavily protected by firewalls or packet filters. The report also demonstrates how covert communication can be achieved through a proof-of-concept program coded in Java. In particular, the program makes use of Jpcap, a Java library for capturing and sending network packets to create the customized TCP/IP packets used to transmit hidden information. The last part of the report explores the applications, detection and ethical concerns of Steganography. In particular, it covers ways in which Steganography can be exploited for nefarious purposes, the concept of passive and active wardens in Network Steganography detection (or Steganalysis) and the conflict of interest between governments, organizations and individuals where Steganography is concerned.en_US
dc.format.extent50 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networksen_US
dc.titleNetwork steganography – an investigation of covert channels in network protocolsen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
dc.contributor.supervisor2Xiao Xiaokuien_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
SCE10-0490.pdf
  Restricted Access
1.48 MBAdobe PDFView/Open

Page view(s) 50

619
Updated on Apr 25, 2025

Download(s)

15
Updated on Apr 25, 2025

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.