Document Type
|
:
|
BL
|
Record Number
|
:
|
662587
|
Doc. No
|
:
|
dltt
|
Title & Author
|
:
|
Information hiding in communication networks : : fundamentals, mechanisms, applications, and countermeasures /\ Wojciech Mazurczyk...[et al.].
|
Series Statement
|
:
|
IEEE Press Series on Information and Communication Networks Security
|
Page. NO
|
:
|
1 online resource (325 pages).
|
ISBN
|
:
|
9781119081715
|
|
:
|
: 1119081718
|
|
:
|
9781119081838
|
|
:
|
1119081831
|
Notes
|
:
|
Description based upon print version of record
|
Bibliographies/Indexes
|
:
|
ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols
|
Contents
|
:
|
Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
|
|
:
|
Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
|
|
:
|
3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
|
|
:
|
7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
|
Subject
|
:
|
Data protection.
|
Subject
|
:
|
Computer networks-- Security measures.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25
|
Added Entry
|
:
|
Mazurczyk, Wojciech.
|
|
:
|
Wendzel, Steffen.
|
|
:
|
Zander, Sebastian.
|
|
:
|
Houmansadr, Amir.
|
|
:
|
Szczypiorski, Krzysztof,1949-
|
Added Entry
|
:
|
Ohio Library and Information Network.
|