Back to Search Start Over

StegEraser: Defending cybersecurity against malicious covert communications.

Authors :
Zhang, Jianfeng
Zhang, Wensheng
Xu, Jingdong
Source :
Journal of Computer Security. 2024, Vol. 32 Issue 2, p117-139. 23p.
Publication Year :
2024

Abstract

Traditionally, the mission of intercepting malicious traffic between the Internet and the internal network of entities like organizations and corporations, is largely fulfilled by techniques such as deep packet inspection (DPI). However, steganography, the methodology of hiding secret data in seemingly benign public mediums (e.g., images), has been leveraged by advanced persistent threat (APT) groups in recent years, and is almost impossible to be detected and intercepted by traditional techniques, posing a pervasive and realistic threat to cybersecurity. Additionally, internal networks' vulnerability to steganography is further exacerbated by the connectivity and large attack surface of the Internet of Things (IoT), whose adoption and deployment are quickly expanding. To protect computer systems against malicious communications that apply steganographic methods potentially unknown to cybersecurity stakeholders, we propose StegEraser, an approach to removing the secret information embedded in public mediums by adversaries, that is fundamentally distinct from existing research which is primarily designed for known steganographic methods. Implemented for images, StegEraser injects an excessively huge amount of random binary data with a novel steganographic method into the images, by utilizing the information-merging capabilities of invertible neural networks (INNs), in order to "overload" adversaries' steganographic hiding capacity of images transmitted through the firewall performing DPI. In the meantime, StegEraser preserves the perceptual quality of the images. In other words, StegEraser "defeats unknown steganography with steganography". Extensive evaluation verifies that StegEraser significantly outperforms state-of-the-art (SOTA) methods in terms of removing secret information embedded with both traditional and neural network-based steganographic methods, while visually maintaining the image quality. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0926227X
Volume :
32
Issue :
2
Database :
Academic Search Index
Journal :
Journal of Computer Security
Publication Type :
Academic Journal
Accession number :
176804383
Full Text :
https://doi.org/10.3233/JCS-220094