1. Detecting Malicious Devices in IPSEC Traffic with IPv4 Steganography
- Author
-
Gabriel Jekateryńczuk, Damian Jankowski, René Veyland, and Zbigniew Piotrowski
- Subjects
steganography ,network security ,data privacy ,malicious traffic ,network monitoring ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
This study investigates the application of steganography for enhancing network security by detecting and promptly eliminating malicious packets to prevent flooding and consequent denial of service attacks while also identifying malicious equipment. The paper discusses foundational concepts such as the prisoner’s dilemma, covert channels, qualitative metrics, and existing steganography techniques in computer communications. An architecture was developed to assess the effectiveness of this solution, and experiments were conducted, with their results presented. This contribution leverages established steganographic principles and seamlessly integrates with widely adopted IPsec protocols, offering a solution to improve covert communication within computer networks.
- Published
- 2024
- Full Text
- View/download PDF