Steganography has evolved into various forms and remains an ef-fective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as ter-rorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several tech-niques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.

A Survey of Steganography Tools at Layers 2-4 and HTTP

Bistarelli S.;Luchini C.;Mercanti I.;Santini F.
2023

Abstract

Steganography has evolved into various forms and remains an ef-fective way to hide sensitive information. Network Steganography, also known as "Covert Channels," is popular in fields such as ter-rorism and security. As a result, the scientific community created a specific taxonomy to categorize it, and developed several tech-niques and tools to conceal communication between the parties. In this paper, we have curated a list of available software tools that can be used to create a covert channel at layers 2 to 4 of the ISO/OSI model and related to the HTTP protocol.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11391/1587849
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact