Covert channel cyber-attack over video stream DCT payload: (Copyright protection algorithm for video and audio streams)

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The two main cyber-attack techniques via video packets are based on using the packet header or the payload. Most of the standard software protection tools easily detect anomalies in headers since there are fewer places to embed the malicious content. Moreover, due to the relatively small header size, such attacks are limited by the data volumes that can transfer. On the other hand, a cyber-attack that uses video packets’ payload can effectively conceal much more information and produce covert channels. Multimedia covert channels provide reasonable bandwidth and long-lasting transmission streams, suitable for planting malicious information and therefore used as an exploit alternative. The primary focus of this article is a proof of concept of cyber-attack that conceals malicious data in a video payload in the compressed domain, using steganography (in real time). This malicious data is extracted using a covert channel and a malware (that had previously planted at the end user side), on the other side. Additionally, after the implementation of the attack, it is necessary to review its parameters and conclude what the optimal parameters to use in different video scenarios. In this paper, we will demonstrate attacks that take advantage of compressed domain video payload. It is important to note that this method can be used as a method of copyright protection.

Cite

CITATION STYLE

APA

Segal, Y., & Hadar, O. (2019). Covert channel cyber-attack over video stream DCT payload: (Copyright protection algorithm for video and audio streams). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11527 LNCS, pp. 47–66). Springer Verlag. https://doi.org/10.1007/978-3-030-20951-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free