Steganography has evolved into various forms and remains an ef-fective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as ter-rorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several tech-niques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.
A Survey of Steganography Tools at Layers 2-4 and HTTP
Bistarelli S.;Luchini C.;Mercanti I.;Santini F.
2023
Abstract
Steganography has evolved into various forms and remains an ef-fective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as ter-rorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several tech-niques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.File in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.