Modern text hiding, text steganalysis, and applications: a comparative analysis

M Taleby Ahvanooey, Q Li, J Hou, AR Rajput, Y Chen - Entropy, 2019 - mdpi.com
Modern text hiding is an intelligent programming technique which embeds a secret
message/watermark into a cover text message/file in a hidden way to protect confidential …

A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches

Z Sui, H Shu, F Kang, Y Huang, G Huo - Applied Sciences, 2023 - mdpi.com
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade
censorship. While providing convenience to users, tunnel technology poses a hidden …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Information hiding: challenges for forensic experts

W Mazurczyk, S Wendzel - Communications of the ACM, 2017 - dl.acm.org
Information hiding: Challenges for forensic experts Page 1 86 COMMUNICATIONS OF THE
ACM | JANUARY 2018 | VOL. 61 | NO. 1 review articles IMA GE B Y ANDRIJ BOR YS A SSOCIA …

CCgen: injecting covert channels into network traffic

F Iglesias, F Meghdouri, R Annessi… - Security and …, 2022 - Wiley Online Library
Covert channels are methods to convey information clandestinely by exploiting the inherent
capabilities of common communication protocols. They can be used to hide malware …

How to make an intrusion detection systemaware of steganographic transmission

T Koziak, K Wasielewska, A Janicki - Proceedings of the 2021 European …, 2021 - dl.acm.org
Information hiding techniques are becoming a major threat in network communication. This
paper describes how to modify an intrusion detection system (IDS) to detect certain types of …

Efficient non-linear covert channel detection in TCP data streams

H Nafea, K Kifayat, Q Shi, KN Qureshi, B Askwith - IEEE Access, 2019 - ieeexplore.ieee.org
Cyber-attacks are causing losses amounted to billions of dollars every year due to data
breaches and Vulnerabilities. The existing tools for data leakage prevention and detection …

DAT detectors: uncovering TCP/IP covert channels by descriptive analytics

F Iglesias, R Annessi, T Zseby - Security and Communication …, 2016 - Wiley Online Library
Covert channels provide means to conceal information transfer between hosts and bypass
security barriers in communication networks. Hidden communication is of paramount …

Covert timing channel detection method based on random forest algorithm

Q Li, P Zhang, Z Chen, G Fu - 2017 IEEE 17th International …, 2017 - ieeexplore.ieee.org
Network stealth events emerging in endless stream, covert timing channel is one of the most
difficult means to prevent. In order to further improve the detection rate of the covert timing …

[HTML][HTML] Advanced Network and System Security Teaching

M Ogrizović, P Vuletić, Ž Stanisavljević - Electronics, 2024 - mdpi.com
In an attempt to address the growing shortage of cybersecurity specialists in the country, the
School of Electrical Engineering, University of Belgrade, started the course entitled …