Cargando…

Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures /

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Inf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Mazurczyk, Wojciech, Wendzel, Steffen, Zander, Sebastian, Houmansadr, Amir, Szczypiorski, Krzysztof
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley, 2016.
Colección:IEEE Press series on information & communication networks security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn940438314
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 160220s2016 nju o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d DG1  |d YDXCP  |d OCLCF  |d STF  |d FTU  |d DEBBG  |d OCLCQ  |d KSU  |d OCLCQ  |d RECBK  |d UMR  |d IDB  |d MERUC  |d DG1  |d LIP  |d ESU  |d OCLCQ  |d UAB  |d U3W  |d OCLCQ  |d WRM  |d CAUOI  |d AU@  |d OCLCQ  |d LEAUB  |d OCLCQ  |d LVT  |d SFB  |d IEEEE  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 990472088  |a 1151526043  |a 1164464455 
020 |a 9781119081715  |q (electronic bk.) 
020 |a 1119081718  |q (electronic bk.) 
020 |a 1119081777 
020 |a 9781119081777 
020 |a 1118861698 
020 |a 9781118861691 
020 |z 9781119081838 
020 |z 1119081831 
024 7 |a 10.1002/9781119081715  |2 doi 
029 1 |a AU@  |b 000061147900 
029 1 |a CHNEW  |b 000945187 
029 1 |a CHVBK  |b 480262012 
029 1 |a DEBBG  |b BV043628823 
029 1 |a DEBBG  |b BV043738327 
029 1 |a DEBSZ  |b 485065479 
029 1 |a GBVCP  |b 866469265 
035 |a (OCoLC)940438314  |z (OCoLC)990472088  |z (OCoLC)1151526043  |z (OCoLC)1164464455 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Information hiding in communication networks :  |b fundamentals, mechanisms, applications, and countermeasures /  |c Wojciech Mazurczyk [and others]. 
260 |a Hoboken, N.J. :  |b Wiley,  |c 2016. 
300 |a 1 online resource (325 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IEEE Press Series on Information and Communication Networks Security 
588 0 |a Print version record. 
505 0 |a Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References. 
505 8 |a Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications. 
505 8 |a 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary. 
504 |a ReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols. 
505 8 |a 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement. 
520 |a Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert communication channels. . Highlights development trends and potential future directions of Information Hiding. Introduces a new classification and taxonomy for modern data hiding techniques. Presents different types of network steganography mechanisms. Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services This book is intended for academics, graduate students, professionals, and researchers working in the fields of network security, networking, and communications. Wojciech Mazurczyk is an Associate Professor at the Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University, Poland. He is also a senior member of IEEE. Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Telecommunications.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Data protection  |2 fast 
655 4 |a Electronic books. 
700 1 |a Mazurczyk, Wojciech. 
700 1 |a Wendzel, Steffen. 
700 1 |a Zander, Sebastian. 
700 1 |a Houmansadr, Amir. 
700 1 |a Szczypiorski, Krzysztof. 
776 0 8 |i Print version:  |a Mazurczyk, Wojciech.  |t Information Hiding in Communication Networks : Fundamentals, Mechanisms, Applications, and Countermeasures.  |d : Wiley, ©2016  |z 9781119081715 
830 0 |a IEEE Press series on information & communication networks security. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4405578  |z Texto completo 
938 |a IEEE  |b IEEE  |n 7434879 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4405578 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00665448 
938 |a YBP Library Services  |b YANK  |n 12890773 
994 |a 92  |b IZTAP