A Method of Detecting Storage Based Network Steganography Using Machine Learning

被引:8
|
作者
Cho, D. X. [1 ,2 ]
Thuong, D. T. H. [1 ]
Dung, N. K. [3 ]
机构
[1] Posts & Telecommun Inst Technol Hanoi, Informat Secur Dept, Hanoi, Vietnam
[2] FPT Univ, Informat Secur Dept, Hanoi, Vietnam
[3] Thank Dong Univ, Informat Technol Dept, Hanoi, Vietnam
关键词
Information Security; network steganography; detection storage based network steganography; machine learning;
D O I
10.1016/j.procs.2019.06.086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, the techniques of network steganography are widely applied. In addition to the outstanding advantages about the ability to hide and transmit secret information, it has a huge disadvantage that is being exploited by hackers to transmit information or communicate with the control host. Network steganography storage method is one of the network steganography techniques that is being much applied. Due to the characteristics of the storage based network steganography are different from other network steganography techniques, the detection of this techniques is difficult. The traditional tools and methods used to detect steganography are difficult to detect the signs of steganographic packets that use this technique. Therefore, in this paper, the authors propose using machine learning to detect abnormal behavior of steganographic packets. (C) 2019 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:543 / 548
页数:6
相关论文
共 50 条
  • [11] Detecting Hate Speech on Twitter Network Using Ensemble Machine Learning
    Mutanga, Raymond T.
    Naicker, Nalindren
    Olugbara, Oludayo O.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 331 - 339
  • [12] A Novel Framework for Detecting Network Intrusions Based on Machine Learning Methods
    Omarov, Batyrkhan
    Abdinurova, Nazgul
    Abdulkhamidov, Zhamshidbek
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 499 - 510
  • [13] A Novel Edge Based Chaotic Steganography Method Using Neural Network
    Alam, Shahzad
    Ahmad, Tanvir
    Doja, M. N.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 467 - 475
  • [14] Wireless network optimization method based on cognitive cycle using machine learning
    Oshima, Koji
    Kobayashi, Takumu
    Taenaka, Yuki
    Kuroda, Kaori
    Hasegawa, Mikio
    IEICE COMMUNICATIONS EXPRESS, 2018, 7 (07): : 278 - 283
  • [15] A physiological measures-based method for detecting inattention in drivers using machine learning approach
    Sahayadhas, Arun
    Sundaraj, Kenneth
    Murugappan, Murugappan
    Palaniappan, Rajkumar
    BIOCYBERNETICS AND BIOMEDICAL ENGINEERING, 2015, 35 (03) : 198 - 205
  • [16] INSnet: a method for detecting insertions based on deep learning network
    Runtian Gao
    Junwei Luo
    Hongyu Ding
    Haixia Zhai
    BMC Bioinformatics, 24
  • [17] INSnet: a method for detecting insertions based on deep learning network
    Gao, Runtian
    Luo, Junwei
    Ding, Hongyu
    Zhai, Haixia
    BMC BIOINFORMATICS, 2023, 24 (01)
  • [18] SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning
    Masubuchi, Yuma
    Hashimoto, Masaki
    Otsuka, Akira
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (04) : 755 - 765
  • [19] Detecting C&C Server in the APT Attack based on Network Traffic using Machine Learning
    Cho Do Xuan
    Lai Van Duong
    Nikolaevich, Tisenko Victor
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 22 - 27
  • [20] A Mobile Steganography Method Based on Deep Learning
    Liao X.
    Li Y.
    Ouyang J.
    Zhou J.
    Dai X.
    Qin Z.
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2022, 49 (04): : 18 - 25