Information hiding in communication networks : fundamentals, mechanisms, applications, and countermeasures /
Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Inf...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
Wiley,
2016.
|
Colección: | IEEE Press series on information & communication networks security.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Series Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References.
- Chapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications.
- 3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary.
- 7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement.