Secure Data Transmission by using Steganography
|
|
|
- Brett Taylor
- 10 years ago
- Views:
Transcription
1 Abstract Secure Data Transmission by using Steganography R.M. Goudar, Prashant N. Patil, Aniket G.. Meshram*, Sanyog M. Yewale, Abhay V. Fegade Computer Engineering Department, Pune University, MAE, Alandi Pune, Maharashtra , India Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does not allow to detect the presence of hidden secret other than indeed user, over the communication channel. In this paper, we design a system, which uses features of both cryptography as well as steganography, where TCP/IP header is used as a steganographic carrier to hide encrypted data. Steganography is a useful tool that allows covert transmission of information over the communications channel. Keywords: Steganography, Cryptography, Encryption, TCP/IP 1. Introduction As people become aware of the internet day-by-day, the number of users in the network increases considerably thereby, facing more challenges in terms of data storage and transmission over the internet, for example information like account number, password etc. Hence, in order to provide a better security mechanism, we propose a data hiding technique called steganography along with the technique of encryption-decryption. Steganography is the art and science of hiding data into different carrier files such as text, audio, images, video, etc. In cryptography, the secret message that we send may be easily detectable by the attacker. But in steganography, the secret message is not easily detectable. The persons other than the sender and receiver are not able to view the secret message. The secret message that sender transfers over the network, can be encrypted and hidden into TCP/IP header using Stego object. The Stego object is an encrypted message embedded into carrier file. In this paper, current trends and technologies are explained in section II. Followed by covert channel is explained in section III. Secure data transmission using steganography in section IV and its applications are discussed in section V. The secret message that the sender transfers over the network can be encrypted first, which creates cipher message. A stego object is generated by embedding the cipher message into any carrier files such as image. This stego object is then hidden in the irrelevant bits of TCP/IP header and hence creates a covert channel. In this way a more secure data is sent over the communication channel. The reverse procedure is carried out on the receiver s end, where decryption is carried out using the key. After decrypting that stego_object receiver is able to extract secret message, that sender sends for him/her. 2. Current trends and practices Wang Jia-zhen, explained a scheme which uses fourth-order Chebyshev chaotic system to generate chaos sequence which is used to encrypt secret message, and then embeds the modulated message into identification field of IP header. Thus the identification bit of Ipv4 header can be used through PMTUD (Path Maximum Transfer Unit Discovery) and the generation of uncorrelated sequences to send covert information point-to-point. The randomness in the identification field values makes this scheme nondetectable against the detection of secret data through packet filtering and stateful inspection type firewalls. However, this scheme has limitations, when fragmentation occurs, which results in the use of identification field by the message itself as explained by Wang. Implementation of steganography can be done by using two techniques. One is the fragmentation strategy and other is the by using the IP checksum covert channel and hash collision, which is illustrated by Miss Dr. V. R. Ghorpade has the similar approach as suggested by 1
2 Jia-zhen. Where he explained an algorithm to show the 4 th order Chebyshev chaotic system, how steganography can be implemented. Stego medium can be transferred securely. The most recent application is in the client server architecture wherein several clients make a request to the FTP server, say of a library. A log file can be maintained, for audit purposes, based on the requests sent by various users. Moreover, serving the request by transferring a digital image to the user, say, can have the same user information or library information tied to the content packets. This scenario of tags tied to the content can allow for audit. But the first problem that arises here is of fragmentation occurrence. The second problem that arises is that the internet checksum fails to be a secure method for validating data integrity. Jain Ankit describes in short some steganographic techniques such as: Substitution Technique, Transform Domain Technique, Spread Spectrum Technique, Statistical Techniques and Distortion Techniques. He also gives some steganographic tools such as Blindside, Data Marking Technologies, Digital Picture Envelope, Gifshuffle, Hide4PGP etc. Introducing a new subject altogether called as the Steganographic file system where files are neither merely stored, nor stored encrypted, but in which the entire partition is randomized - encrypted files strongly resemble randomized sections of the partition, is also discussed. Another system for data hiding by using the covert channel is the SCONeP (Steganography and Cryptography Over Network Protocols) elaborated by Radu Ciobanu. Here the author proposes an application that reads data from a file and sends it over the covert channel which uses protocols from TCP/IP stack. The author proposes a software application that will have a loadable kernel module that checks incoming or outgoing packets for hidden data. The goal was to test several protocols that are less utilized in steganography, and to compare performances for implemented protocols. Thus SCONeP is used to send hidden data using headers from TCP, IP, UDP and ICMP. Cryptanalysts tries to crack the encrypted data over the network, while the Steganalyst tries detecting messages that are hidden by looking at variances between bit patterns and unusually large file sizes. Encrypted data is more difficult to differentiate from naturally occurring plain text. However there are several techniques to decrypt data from an encrypted one. If we combine the steganography and encryption then we opt for a more secure system Even if the steganography fails the encrypted data might help to protect at least the message. Arvind Kumar also emphasizes few points in this regards. 3. Steganography Over a Covert Channel Covert channel is a communication channel through which information transmits by violating security principles. The communication through covert channel is non-obvious manner. TCP/IP Header can serve as a carrier for a steganography through covert channel. As the steganography is data hiding technique, sender embeds the encrypted data by using carrier file. At the encoder process encryption algorithm is applied over secret file then it embeds with carrier file, it generates stego object that hides into unused fields of TCP/IP header, which implies covert channel. The carrier files may be text, image, audio or video. In our system, we are using images as carrier. Digital images are very useful and secure carrier for hiding the secret massage. Image is a collection of color pixels. In standard, 24 bit bitmap we have three color components per pixel: Red, Green and Blue. Each component is 8 bit and have 2 8 i.e. 256 values. In 3 megapixel image you can hide 9 megabits of information using this technique, which is equivalent of 256 pages of book. If we only change the lowest bits of each pixel, then the numeric values can only change by a small percentage. We can only alter the original pixel color value by ±7. Stego object traverses over a communication channel. Stego object is divided into packets. These packets are hidden in TCP or IP header s unused fields. Many fields from the TCP or IP header are not used for certain situations. 3.1 Structure of TCP header: Structure of TCP header is shown in Fig 3.1, we can use irrelevant fields namely sequence number and option fields Sequence number: It is 32 bit field. Which is use to identify the current position of data byte in the segment. Sequence 2
3 number is randomly generated number based on: local host, local port, remote host, and remote port Options: In order to provide additional functionality several optional parameter may used between a Tcp sender & receiver. The most common option is the maximum segment size option. This option gives the sender maximum segment size the receiver willing to accept. 3.2 Structure of IP header: Structure of IP header is as shown Fig 3.2, irrelevant fields used in IP header are given as follows: Type of service: It is 8 bit field. The type service in IP header is potential for using as steganographic carrier, because many networks never use them Identification field: It is 16 bit field. When fragmentation of message occur the value of identification field is copied into all fragments. The identification number helps the destination in reassembling the fragments of the datagram Flags: It is 3 bit field which gives information about Reserved, Do not fragment bit and more fragment bit Fragmentation offset: This bit is 13 bit field. When the fragmentation of message occurs this field specifies the offset, or position in the overall message, where the data in this fragment goes Option: Options are not required for every datagram to be sent. They are used for network testing & debugging purpose. 4. Proposed Work In this paper we are more focusing on Identification field of the IP header to hide secret encrypted data. Identification field is used only when fragmentation occurs. At the receiver end, to reassemble the packets, identification field tells the right order for that. If fragmentation is not occurred, then identification field will always be unused, so that we can use this 16 bit field to hide secret encrypted message. To avoid fragmentation, we use MTU. Maximum transfer unit decides limit for packet size for transmission over network. Sender and receiver, both should have awareness of MTU unit. For the encryption and decryption we use Elliptic curve cryptography. Elliptic Curve Cryptography is a public key cryptography. In public key cryptography each user or the device taking part in the communication generally have a pair of keys, a public key and a private key, and a set of operations associated with the keys to do the cryptographic operations. Only the particular use knows the private key whereas the public key is distributed to all users taking part in the communication. Some public key algorithm may require a set of predefined constants to be known by all the devices taking part in the communication. Domain parameters in ECC are an example of such constants. Public key cryptography, unlike private key cryptography, does not require any shared secret between the communicating parties but it is much slower than the private key cryptography. The mathematical operations of ECC is defined over the elliptic curve y = x 3 + ax + b, where 4a + 27b 0. Each value of the 'a' and 'b' gives a different elliptic curve. All points (x, y) which satisfies the above equation plus a point at infinity lies on the elliptic curve. The public key is a point in the curve and the private key is random number. The public is obtained by 3
4 multiplying the private key with the generator point G in the curve. Generator point G, parameters a, b and some another constants constitutes with domain parameter of ECC. For the secure file transfer by using Steganography, we propose a conceptual scheme. Consider Alice as sender and Bob is a receiver. Alice wants to transfer secrete file for Bob over a network. Fig.4.1 and Fig.4.2 describe the flowchart of ECC algorithm for encryption and decryption. 5. Application: 5.1 A client server architecture wherein several clients make a request to the FTP server, say of a library. A log file can be maintained, for audit purposes, based on the requests sent by various users. Moreover, serving the request by transferring a digital image to the user, say, can have the same user information or library information tied to the content packets. This scenario of tags tied to the content can allow for audit. A logging process for the above application scenario based on the user or application specific information completes the picture (i.e. logging of valid user), maintaining the record of user requests based on user information and ultimately serving the user requests by having either the user information or the server I source (library) information tied to the content packets to avoid unlawful use such as copyright violation. 5.2 Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. 6. Conclusion and Future Scope Secure data transfer by using steganography provides an efficient technique for data hiding by using covert channel. Covert channel is a subject which can be seen in many areas. Hiding the medium itself has a strong impact on the network communication providing high level of security and a more secure system respectively. The TCP/IP suite along with the covert medium further enhances the security of the system since attackers are more concerned over the http. The proposed technique will avoid illegal transmission of secret communication on the web and will provide a better secure system in case of Authentication. Acknowledgment: We would like to express our gratitude towards a number of people whose support and consideration has been an invaluable asset during the course of this work. References: Xu Bo, Wang Jia-zhen, Peng De-yun, Practical Protocol Steganography : Hiding Data in IP Header,2007. Miss D. D. DhobaJe Dr. V. R. Ghorpade Mr. B. S. Patjj Mrs. S. B. Patil Steganography By Hiding Data In Tcp/Ip Headers,2010. D. K. Kamran Ahsan. Practical Data Hiding in TCP/IP, Workshop on Multimedia Security at ACM Multimedia, Jain Ankit, Steganography : A solution for data hiding Arvind Kumar Km. Pooja Steganography- A Data Hiding Technique,2010. Steven J. Murdoch and Stephen Lewis, Embedding Covert Channels into TCP/IP,2005. Radu Ciobanu, Ovidiu Tirsa, Raluca Lupu, Sonia Stan, Steganography and Cryptography Over Network Protocols,2011. Vishal Bharti, Itu Snigdh Practical Development and Deployment Of Covert Communication In IPv4. Enrique Cauich, Roberto Gómez, Ryouske Watanabe Data Hiding in Identification and Offset IP fields ZHANG lie etc. "Information hiding in TCP/IP based on chaos". Journal on Communication.voJ.26 NO. I A January 4
5 2005. Fig.3.1 TCP header Fig.3.2 IP Header 5
6 Fig.4.1 ECC Algorithm 6
7 Fig.4.2 ECC Algorithm(cont.) 7
8 This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE s homepage: The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library, NewJour, Google Scholar
Practical Internet Steganography: Data Hiding in IP
Practical Internet Steganography: Data Hiding in IP Deepa Kundur Texas A&M University, College Station Department of Electrical Engineering 3128 TAMU, College Station Texas, USA 77843-3128 [email protected]
Achieving Success through Effective Business Communication
Achieving Success through Effective Business Communication Farmeena Khan 1* Mohd. Ehmer Khan 2 1. Department of Management, Janardan Rai Nagar Rajasthan Vidyapeeth University, Rajasthan, India 2. Department
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Database Management System for a Digitized Medical Image
Database Management System for a Digitized Medical Image Ajala Funmilola A*, Opasola Tomilola R, Falohun Adeleye S, Fenwa Olusayo D Department of Computer Science and Engineering, LAUTECH Ogbomoso, Oyo
A Proposed Decision Support System/Expert System for Guiding. Fresh Students in Selecting a Faculty in Gomal University, Pakistan
A Proposed Decision Support System/Expert System for Guiding Fresh Students in Selecting a Faculty in Gomal University, Pakistan Muhammad Zaheer Aslam*, Nasimullah, Abdur Rashid Khan Gomal University DlKhan.Pakistan
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case.
Present and Desired Network Management to Cope with the Expected Expansion, NM-AIST Study Case. Shadrack Stephen Madila, George Sizya Germinous, Sarah Nyanjara Magoti ICT department, Moshi University College
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
The Impact of Operational Risk Management on the Financial Development and Economic Growth: A Case Study of Saudi SME Companies
The Impact of Operational Risk Management on the Financial Development and Economic Growth: A Case Study of Saudi SME Companies Abdulaziz Alrashidi 1 Omar Baakeel 2 1. Collage of Management and Public
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
New security and control protocol for VoIP based on steganography and digital watermarking
New security and control protocol for VoIP based on steganography and digital watermarking Wojciech Mazurczyk1 and Zbigniew Kotulski1,2 1 Warsaw University of Technology, Faculty of Electronics and Information
Application of Variance Analysis for Performance Evaluation: A Cost/Benefit Approach.
Application of Variance Analysis for Performance Evaluation: A Cost/Benefit Approach. Jude Aruomoaghe Sunny Agbo Department of Accounting, Igbinedion University, Okada, Edo State. *E-mail of Corresponding
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
The role of business intelligence in knowledge sharing: a Case Study at Al-Hikma Pharmaceutical Manufacturing Company
The role of business intelligence in knowledge sharing: a Case Study at Al-Hikma Pharmaceutical Manufacturing Company Samer Barakat 1* Hasan Ali Al-Zu bi 2 Hanadi Al-Zegaier 3 1. Management Information
Adoption of Point of Sale Terminals in Nigeria: Assessment of Consumers Level of Satisfaction Abstract Key words 1. INTRODUCTION
Adoption of Point of Sale Terminals in Nigeria: Assessment of Consumers Level of Satisfaction Olugbade Adeoti * Kehinde Osotimehin Department of management and accounting, Obafemi Awolowo University, Ile-Ife,
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities?
Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities? Hussain A.H Awad * Fadi M. Battah Faculty of Arts and
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment More Amar [email protected] Kulkarni Anurag [email protected] Kolhe Rakesh [email protected] Kothari Rupesh
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
A Study of the Recruitment and Selection process: SMC Global
A Study of the Recruitment and Selection process: SMC Global Abstract Neeraj Kumari Manav Rachna International University, Faridabad, India. Email: [email protected] Better recruitment and selection
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Some Special Artex Spaces Over Bi-monoids
Some Special Artex Spaces Over Bi-monoids K.Muthukumaran (corresponding auther) Assistant Professor PG and Research Department Of Mathematics, Saraswathi Narayanan College, Perungudi Madurai-625022,Tamil
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
European Journal of Business and Management ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.5, No.24, 2013
Factors Influencing Effective Talent Management Strategy in Organizations: A Case Study of Corrugated Iron Sheets Limited- Mombasa Kenya KHUDNICK MOCHORWA; CHARLES MWANGI Corresponding author [email protected]
Chapter 37. Secure Networks
Chapter 37 Network Security (Access Control, Encryption, Firewalls) Secure Networks Secure network is not an absolute term Need to define security policy for organization Network security policy cannot
Developing an In-house Computerized Maintenance Management System for Hospitals
Developing an In-house Computerized Maintenance Management System for Hospitals David Mutia 1, 2* John Kihiu 1 Stephen Maranga 1 1. Department of Mechanical Engineering, Jomo Kenyatta University of Agriculture
Effect of the learning support and the use of project management tools on project success: The case of Pakistan
Effect of the learning support and the use of project management tools on project success: The case of Pakistan Muhammad Javed 1 Atiq ur Rehman 2* M. Shahzad N.K. Lodhi 3 1. Student MSPM, SZABIST, Islamabad
Impact of Computer Education on Students Interest and Performance in Automobile Trade, in Nigerian Secondary Schools and Colleges
Impact of Computer Education on Students Interest and Performance in Automobile Trade, in Nigerian Secondary Schools and Colleges Name: Ohwojero Chamberlain Address: Delta State University Secondary School,
A Secure Data Transmission By Integrating Cryptography And Video Steganography
A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
European Journal of Business and Management ISSN 2222-1905 (Paper) ISSN 2222-2839 (Online) Vol.7, No.1, 2015
ISSN 2222-905 (Paper) ISSN 2222-2839 (Online) Vol.7, No., 205 Impact of Customer Relationship Marketing on Market Performance in Banking Sector A Study on Bank of Ceylon and Hatton National Bank Customers
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Types of Achievement Tests Which Are Preferred By Outstanding Students at Al-Hussein Bin Talal University
Types of Achievement Tests Which Are Preferred By Outstanding Students at Al-Hussein Bin Talal University Dr. Atif Eid Alrfooh* Al-Hussein Bin Talal University, Department of Special Education, Faculty
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Working Capital Management & Financial Performance of Manufacturing Sector in Sri Lanka
Working Capital Management & Financial Performance of Manufacturing Sector in Sri Lanka J. Aloy Niresh [email protected] Abstract Working capital management is considered to be a crucial element in determining
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Steganography- A Data Hiding Technique
Steganography- A Data Hiding Technique Arvind Kumar Assistant Professor Vidya College of engineering, Meerut, India Km. Pooja Vankateshwara institute of computer Science and technology, Meerut, India ABSTRACT
ISSN 2224-607X (Paper) ISSN 2225-0565 (Online) Vol.3, No.3, 2013. Abstract
Abstract Pattern of Spread of Medical Schools in Nigeria Dr Oladimeji Adebayo 1*, Dr Leslie Omoruyi, 1 Dr Adetunji Labiran 2, Dr Oguogho Ebhodaghe 3, Dr Okwudili Agu 4, Dr Hillary Emoekpere 5,Dr Efosa
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
IPV6 vs. SSL comparing Apples with Oranges
IPV6 vs. SSL comparing Apples with Oranges Reto E. Haeni [email protected] The George Washington University Cyberspace Policy Institute 2033 K Str. Suite 340 N Washington DC 20006 Washington DC,
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Investigating the Performance of VOIP over WLAN in. Campus Network
Investigating the Performance of VOIP over WLAN in Campus Network 1 U. R. ALO and 2 NWEKE HENRY FRIDAY Department of Computer Science Ebonyi State University Abakaliki, Nigeria 1 Email:- [email protected]
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: [email protected] Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Use and satisfaction with online public access catalogue in selected university libraries in Ogun State, Nigeria
Vol., No.11, 01 Use and satisfaction with online public access catalogue in selected university libraries in Ogun State, Nigeria ONUOHA, Uloma Doris Department of Information Resources Management Babcock
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
