Steganography has evolved into various forms and remains an effective way to hide sensitive information. Network Steganography, also known as "Covert Channels,"is popular in fields such as terrorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several techniques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.
A Survey of Steganography Tools at Layers 2-4 and HTTP / Stefano Bistarelli; Michele Ceccarelli; Chiara Luchini; Ivan Mercanti; Francesco Santini. - ELETTRONICO. - (2023), pp. 1-9. (Intervento presentato al convegno ARES 2023: The 18th International Conference on Availability, Reliability and Security tenutosi a Benevento, Italy nel 29 August 2023- 1 September 2023) [10.1145/3600160.3605058].
A Survey of Steganography Tools at Layers 2-4 and HTTP
Chiara Luchini;
2023
Abstract
Steganography has evolved into various forms and remains an effective way to hide sensitive information. Network Steganography, also known as "Covert Channels,"is popular in fields such as terrorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several techniques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.