A framework for avoiding steganography usage over HTTP

19Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process. © 2011 Elsevier Ltd. All rights reserved.

Cite

CITATION STYLE

APA

Blasco, J., Hernandez-Castro, J. C., De Fuentes, J. M., & Ramos, B. (2012). A framework for avoiding steganography usage over HTTP. Journal of Network and Computer Applications, 35(1), 491–501. https://doi.org/10.1016/j.jnca.2011.10.003

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free