Font Size: a A A

Research On Information Steganography Based On Network Data Stream

Posted on:2020-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y DengFull Text:PDF
GTID:2428330596476522Subject:Engineering
Abstract/Summary:PDF Full Text Request
The methods of network communication attack is getting multifarious,due to the popularity and development of global network communication.For protecting the infomation in network from intercepting and capturing by attacker,the machines of server and client had supported services such as encryption and identity authentication etc.However,the information using encryption and identity authentication still could be received by attacker,and could be decrypted and analyzed through time.As a result,the data steganographia research come alive gradually to avoid attackers capture the information.Traditional network information steganographia mostly uses the media files as the cover files,including audio,video and picture.However,the concealment,functionality and efficiency of them are limited.This thesis presents an original network information steganographia based on network protocol.Using the protocols and the relationship among the protocols,transfer data,which will hide the information and work with identification.In the new data steganography technology proposed in this thesis,hidden operation of hidden data does not hinder users' requests for access to real network data and is transparent to users.It can transmit the covert signal and authenticate the second identity,at the same time,the users are not aware of it.In this thesis,after the system experiments and tests,the feasibility,concealment and robustness of steganography technology based on network data flow are verified as valid.The main innovations and research contents are divided into the following four parts:1.A new steganography technology based on network data flow is proposed.Unlike traditional steganography,this method takes the relationship between data packets in network data stream as a carrier,then hides data.Experiments show that this method improves the concealment of steganographic channels.2.An information steganography technology based on packet time interval is proposed.Encoding covert data into the time interval of data packet transmission,then hiding and transmitting the covert data.This method is not easy to attract attention and has no obvious statistical characteristics of traffic.3.A coding technology based on Morse code is proposed.The data is encoded into time-interval data using Morse code.Experiments show that this coding method is feasible and efficient.4.Designing and implementing the covert data transmission system and identity authentication system based on the above-mentioned steganography technology.Using Shadowsocks proxy software,Socks5 protocol transponder,Scapy function library and NFQUEUE target in Iptables for completing system functions.The system results are analyzed and evaluated,and the experimental results verify the robustness and correctness of the steganography technology based on packet time interval.
Keywords/Search Tags:protocol, data steganographia, TCP timestamp, network data traffic
PDF Full Text Request
Related items