Syntax and Semantics-Preserving Application-Layer Protocol Steganography

Norka B. Lucena, James Pease, Payman Yadollahpour, Steve J. Chapin

Research output: Contribution to journalArticlepeer-review

31 Scopus citations

Abstract

Protocol steganography allows users who wish to communicate secretly to embed information within other messages and network control protocols used by common applications. This form of unobservable communication can be used as means to enhance privacy and anonymity as well as for many other purposes, ranging from entertainment to protected business communication or national defense. In this paper, we describe our approach to application-layer protocol steganography, describing how we can embed messages into a commonly used TCP/IP protocol. We also introduce the notions of syntax and semantics preservation, which ensure that messages after embedding still conform to the host protocol. Based on those concepts, we attempt to produce reasonably secure and robust stegosystems. To demonstrate the efficacy of our approach, we have implemented protocol steganography within the Secure Shell (SSH) protocol. Findings indicate that protocol steganographic system is reasonably secure if the statistical profile of the covermessages and the statistical profile of its traffic match their counterparts after embedding.

Keywords

  • Application protocols
  • SSH
  • Semantics
  • Steganography
  • Syntax

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Syntax and Semantics-Preserving Application-Layer Protocol Steganography'. Together they form a unique fingerprint.

Cite this