000 08016nam a2200805 i 4500
001 7434879
003 IEEE
005 20220712205927.0
006 m o d
007 cr |n|||||||||
008 160412s2016 nju ob 001 eng d
020 _a9781119081715
_qelectronic bk.
020 _z9781118861691
_qprint
020 _z1119081718
_qelectronic bk.
020 _z9781119081838
020 _z1119081831
024 7 _a10.1002/9781119081715
_2doi
035 _a(CaBNVSL)mat07434879
035 _a(IDAMS)0b00006484fee221
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
245 0 0 _aInformation hiding in communication networks :
_bfundamentals, mechanisms, applications, and countermeasures /
_cWojciech Mazurczyk...[et al.].
264 1 _aHoboken, New Jersey :
_bWiley,
_c2016.
264 2 _a[Piscataqay, New Jersey] :
_bIEEE Xplore,
_c[2016]
300 _a1 PDF (325 pages).
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aIEEE Press Series on Information and Communication Networks Security
504 _aReferencesChapter 6: Network Flow Watermarking; 6.1 Principles, Definitions, and Properties; 6.2 Applications of Flow Watermarks; 6.3 Example Flow Watermarking Systems; 6.4 Watermarking Versus Fingerprinting; 6.5 Challenges of Flow Watermarking; Summary; References; Chapter 7: Examples of Information Hiding Methods for Popular Internet Services; 7.1 IP Telephony: Basics and Information Hiding Concepts; 7.2 Information Hiding in Popular P2P Services; 7.3 Information Hiding in Modern Mobile Devices1; 7.4 Information Hiding in New Network Protocols
505 0 _aSeries Page; Title Page; Copyright; Dedication; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Acronyms; Chapter 1: Introduction; 1.1 Information Hiding Inspired by Nature; 1.2 Information Hiding Basics; 1.3 Information Hiding Throughout the History1; 1.4 Evolution of Modern Information Hiding; 1.5 Emerging Trends in Information Hiding3; 1.6 Applications of Information Hiding and Recent Use Cases; 1.7 Countermeasures for Information Hiding Techniques; 1.8 Potential Future Trends in Information Hiding; 1.9 Summary; 1.10 Organization of the Book; References
505 8 _aChapter 2: Background Concepts, Definitions, and Classification2.1 Classification of Information Hiding in Communication Networks; 2.2 Evolution of Information Hiding Terminology; 2.3 Network Steganography: Definitions, Classification and Characteristic Features; 2.4 Traffic Type Obfuscation: Definitions, Classification and Characteristic Features; 2.5 Hidden Communication Model and Communication Scenarios; 2.6 Information Hiding Countermeasures Models; 2.7 Summary; References; Chapter 3: Network Steganography; 3.1 Hiding Information in Protocol Modifications
505 8 _a3.2 Hiding Information in the Timing of Protocol Messages3.3 Hybrid Methods; 3.4 Summary; References; Chapter 4: Control Protocols for Reliable Network Steganography; 4.1 Steganographic Control Protocols; 4.2 Deep Hiding Techniques; 4.3 Control Protocol Engineering; 4.5 Techniques for Timing Methods; 4.6 Attacks on Control Protocols; 4.7 Open Research Challenges for Control Protocols; 4.8 Summary; References; Chapter 5: Traffic Type Obfuscation; 5.1 Preliminaries; 5.2 Classification Based on the Objective; 5.3 Classification Based on the Implementation Domain; 5.4 Countermeasures; 5.5 Summary
505 8 _a7.5 Information Hiding Concepts for Wireless Networks7.6 Multiplayer Games and Virtual Worlds4; 7.7 Social Networks; 7.8 Internet of Things; 7.9 Summary; References; Chapter 8: Network Steganography Countermeasures; 8.1 Overview of Countermeasures; 8.2 Identification and Prevention During Protocol Design; 8.3 Elimination of Covert Channels; 8.4 Limiting the Channel Capacity; 8.5 General Detection Techniques and Metrics; 8.6 Detection Techniques for Covert Channels; 8.7 Future Work; 8.8 Summary; References; Chapter 9: Closing Remarks; Glossary; Index; End User License Agreement
506 1 _aRestricted to subscribers or individual electronic text purchasers.
520 _aDescribes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert communication channels. . Highlights development trends and potential future directions of Information Hiding. Introduces a new classification and taxonomy for modern data hiding techniques. Presents different types of network steganography mechanisms. Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services This book is intended for academics, graduate students, professionals, and researchers working in the fields of network security, networking, and communications. Wojciech Mazurczyk is an Associate Professor at the Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University, Poland. He is also a senior member of IEEE. Steffen Wendzel is Head of Secure Building Automation at the Fraunhofer Institute for Communication, Information Processing, and Ergonomics (FKIE) in Bonn, Germany. Sebastian Zander is a Lecturer at the School of Engineering and Information Technology, Murdoch University, Australia. Amir Houmansadr is an Assistant Professor within the College of Information and Computer Sciences at the University of Massachusetts Amherst. Krzysztof Szczypiorski is a Professor of Telecommunications at the Institute of Telecommunications, Faculty of Electronics and Information Technology at Warsaw University of Technology, Poland.
530 _aAlso available in print.
538 _aMode of access: World Wide Web
588 _aDescription based on PDF viewed 04/12/2016.
650 0 _aData protection.
_97245
650 0 _aComputer networks
_xSecurity measures.
_93969
655 4 _aElectronic books.
_93294
695 _aComputers
695 _aCryptography
695 _aDelays
695 _aHair
695 _aIP networks
695 _aJoining processes
695 _aManganese
695 _aProtocols
695 _aReceivers
695 _aReliability
695 _aRobustness
695 _aSecurity
695 _aSilicon
695 _aSkin
695 _aWatermarking
700 1 _aMazurczyk, Wojciech.
_928795
700 1 _aWendzel, Steffen.
_928796
700 1 _aZander, Sebastian.
_928797
700 1 _aHoumansadr, Amir.
_928798
700 1 _aSzczypiorski, Krzysztof.
_928799
710 2 _aIEEE Xplore (Online Service),
_edistributor.
_928800
710 2 _aWiley,
_epublisher.
_928801
776 0 8 _iPrint version:
_aMazurczyk, Wojciech
_tInformation Hiding in Communication Networks : Fundamentals, Mechanisms, Applications, and Countermeasures
_d: Wiley,c2016
_z9781119081715
830 0 _aIEEE Press series on information & communication networks security.
_928584
856 4 2 _3Abstract with links to resource
_uhttps://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7434879
942 _cEBK
999 _c74440
_d74440