Loading...
Please wait, while we are loading the content...
Similar Documents
Steganography Techniques for Command and Control (C2) Channels
| Content Provider | Scilit |
|---|---|
| Author | Bieniasz, Jedrzej Szczypiorski, Krzysztof |
| Copyright Year | 2019 |
| Description | The aim of steganography is to conceal secret data by utilizing various features of the different objects called carriers. Since the ancient times through the medieval ages until today, steganography has been widely used to hide information against observers on the way to recipients. Steganography was generally recognized in the context of hiding communication between adversaries or criminals, whereas other applications were considered as very specific or mostly theoretical without a possibility of the correct implementation. In last years, the increasing evidence of the real applications of steganography for the covert data storage and the covert data communication has given another security factor to consider by engineers and cyber security experts. To emphasize steganography as the trending topic for information security, recent reports by Kaspersky [1], McAfee [2] or Fortinet [3] warned that information hiding techniques applied by computer malicious software designers are highly emerging cyber threats. Applying steganography for computer malware operations and communication enables to: bypass common security mechanisms, such as antivirues, Intrusion Detection/Intrusion Prevention systems, firewalls. All of them would allow a network traffic or multimedia files with hidden data as they would recognize them as normal, non-violating and non-suspicious network communication or data exchange. evade or make a detection a harder. Steganography introduces an additional level of difficulty in the forensic and malware analyses. Book Name: Botnets |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2018-0-95575-1&isbn=9780429329913&doi=10.1201/9780429329913-5&format=pdf |
| Ending Page | 216 |
| Page Count | 28 |
| Starting Page | 189 |
| DOI | 10.1201/9780429329913-5 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2019-09-26 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Botnets Information Systems Steganography Hiding Cyber Threats Generally Recognized Security Experts Suspicious Network Covert Data Storage |
| Content Type | Text |
| Resource Type | Chapter |