Information hiding techniques are becoming a major threat in network communication. This paper describes how to modify an intrusion detection system (IDS) to detect certain types of steganography. As a sample IDS we use open-source Zeek software. We show how to adapt it for the purpose of steganalysis. Additionally, we propose a set of validation tests that are suitable for detecting steganography and describe how they were applied to different types of covert channels. We also suggest how to build a steganography detection system by integrating Zeek with a security information and event management system with log and alert support. The scripts are freely available for download.
CITATION STYLE
Koziak, T., Wasielewska, K., & Janicki, A. (2021). How to make an intrusion detection systemaware of steganographic transmission. In ACM International Conference Proceeding Series (pp. 77–82). Association for Computing Machinery. https://doi.org/10.1145/3487405.3487421
Mendeley helps you to discover research relevant for your work.