0% found this document useful (0 votes)
3 views

About Software Implementation of Network Steganography Retransmission Based Algorithm

The document discusses the implementation of a hybrid network steganography method called RSTEG, designed for the Windows TCP/IP stack. It details the algorithm's functioning, which utilizes retransmission mechanisms to embed hidden data within legitimate network packets. The authors also highlight the potential for further development and the challenges associated with detection and analysis of steganographic traffic.

Uploaded by

polsp0812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

About Software Implementation of Network Steganography Retransmission Based Algorithm

The document discusses the implementation of a hybrid network steganography method called RSTEG, designed for the Windows TCP/IP stack. It details the algorithm's functioning, which utilizes retransmission mechanisms to embed hidden data within legitimate network packets. The authors also highlight the potential for further development and the challenges associated with detection and analysis of steganographic traffic.

Uploaded by

polsp0812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

American Journal of Networks and Communications

2015; 4(1): 1-4


Published online January 23, 2015 (http://www.sciencepublishinggroup.com/j/ajnc)
doi: 10.11648/j.ajnc.20150401.11
ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online)

About software implementation of network steganography


retransmission based algorithm
D. Pavlin1, A. Makosiy2
1
Siberian State Aerospace University , Institute of Informatics and Telecommunications/ Faculty of Informatics and Computer Science.
Krasnoyarsk, Russia
2
Khakas State University, Republic of Khakassia,Abakan,Russia

Email address:
[email protected] (D. Pavlin), [email protected] (A. Makosiy)

To cite this article:


D. Pavlin, A. Makosiy. About Software Implementation of Network Steganography Retransmission Based Algorithm. American Journal of
Networks and Communications. Vol. 4, No. 1, 2015, pp. 1-4. doi: 10.11648/j.ajnc.20150401.11

Abstract: Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation
description is provided, including further development prospects.
Keywords: Steganography, Retransmission Mechanism, RSTEG Algorithm

information. Hybrid methods use, both features of protocols,


1. Introduction and network packets.
Modern ways of data transmission and representation, The purpose of this work is an implementation of hybrid
having obvious advantages (ease of recovery, data integrity, steganographic method of data transfer called RSTEG
prospects of use of universal machine and software solutions) (Retransmission Steganography). The method was proposed
can be crossed out with ease with which data theft and by Krzysztof Szczypiorski and his colleagues [1], they also
information modification are possible. Therefore there is a presented simulation of this method in NET2 Simulator.
logical interest in problems of the development of methods to
protect information, primarily in methods of cryptography and
steganography. Given the rapid growth of Internet
communications, which began to substitute all others, there is
a particular interest in methods of secure data transmission
over the Internet stream.
It is known that using steganography methods, you can
ensure the privacy of transmitted information, by hiding the
fact of transfer. A strong argument in favor of usage
steganography includes restrictions on the use of
cryptographic tools and research in this field in a number of
countries. However, it should be noted that steganography
cannot provide data integrity in contrast to cryptography.
At present, we may talk about three areas of steganography: Figure 1. Network steganography methods, classification
classical, computer and digital. Network steganography is on a
joint of a computer and digital steganography. It uses 2. RSTEG Algorithm
computer industry technologies, where data containers
(information structure designed to hide a secret message) are For understanding further material it is necessary to give a
digital objects (network packets). Network steganography general idea of RSTEG. The method is based on network
uses a number of approaches presented on Fig. 1. transport layer protocol features TCP, its ability to secure data
Each of network steganography methods use features of a transfer, more precisely, on the mechanism of packets relay [2].
network protocols, or payload fields for transferring hidden Next, we will concentrate our attention to relay mechanism on
2 D. Pavlin and A. Makosiy: About Software Implementation of Network Steganography Retransmission Based Algorithm

the base of retransmission timer relay RTO (Retransmission Free open-source library SharpPcap was used for parsing
Timeout). and analysis of network packets on the first level of the
It all begins with sender transferring a segment with application [3]. Another free open-source library WinDivert [4]
legitimate data to receiver (Fig. 2). After reception, the was used at the second level of the application. This library
receiver according to the logic of TCP protocol must answer allows applications running in user mode, to capture, modify
with ACK segment. But receiver doesn't do it intentionally and drop network packets from the Windows network stack.
which results in re-sending segment after timeout. The first level application provides mechanism of message
When timeout expires on the sender side, the segment is exchange between sender and receiver (both legitimate and
sent again, but in this case, before sending it, sender modifies hidden data). This level is responsible for establishing a
payload by embedding steganogram. After that segment is connection and sending messages over a network. Description
sent to the receiver, which deliberately did not respond with of RSTEG algorithm doesn’t specify exactly when receiver
ACK segment. doesn’t need to respond. Here it is solved by introduction of a
secret key in payload segment – sender and receiver should
establish some key (sequence of bytes) in advance which can
change from a session to session.
When sending a message, its payload is analyzed by the
routine of reading and analyzing of packets on presence of a
key at it. Analysis occurs on both client and server side.
To increase adaptability and stegfirmness of the method -
subroutine of dropping packets uses a random number from
one to four which is responsible for quantity “not answered”
segments.
Detailed application diagram is presented on Fig. 4. Ovals
represent separate processes. Functions (methods) are
Figure 2. General algorithm of RSTEG italicized, for greater visibility; their names do not accurately
match software implementation. Also, along with functions in
Each of network steganography methods use features of a parentheses it is specified within what process they are
network protocols, or payload fields for transferring hidden executed. Transmitted data is specified above arrows.
information. Hybrid methods use, both features of protocols, The communication session starts with a connection using
and network packets. sockets that are bound to specific ports. Port may vary from
The purpose of this work is an implementation of hybrid session to session; it is passed as a parameter. After the client
steganographic method of data transfer called RSTEG is connected to the server, subprograms of network packets
(Retransmission Steganography). The method was proposed analysis are started on two ends.
by Krzysztof Szczypiorski and his colleagues [1], they also Network packet analysis routines analyze byte sequence
presented simulation of this method in NET2 Simulator. payload fields for key segments. For this purpose one of the
most productive methods by Hafthor Stefansson is used.
3. Software Implementation After the connection is established, the exchange of
messages begins (step 1, 2). We assume that legitimate data is
transferred. It should be noted that at this time, the routine of
reading and analysis of packets already works and examines
the payload of each incoming packet. At some point (step 3),
the sender decides to transfer a key. The packet that contains it
is parsed on the client and server, and if successful,
subroutines of steganogram injection and drop packets are
started. IP address and port are passed as input parameters
(step 4).
Then client sends a message. Drop process is running on the
server side, it receives the message, but doesn't answer. Timer
expires on the client side, and it initiates repeated transfer of a
Figure 3. Application design segment. Here, the steganogram injection subprogram is also
started. After the expiration of the timer and before sending
For the implementation of RSTEG a two-tier client-server the message to a network, a segment gets to this subprogram
application has been developed (Fig. 3). where its payload changes, and then the segment goes down
Each part of the application is working with different levels the stack and gets to a network. Then the steganogram
of abstractions. This resulted in choosing of different injection subroutine stops the work. The server receives a
programming languages. For the first and second level C # and packet with steganogram and doesn't answer again, that
C were chosen, respectively. involves the third transfer – containing legitimate data.
American Journal of Networks and Communications 2015; 4(1): 1-4 3

Segments with steganogram demonstrated below (Fig. 5, 6). contiguous bytes.


Figures show two data link layer frames. The first of these It is noticeable that segments are identical, except for a
contains a segment with legitimate data. The second frame payload and checksum field. Source code for the RSTEG
includes a segment containing steganogram in the payload method is available at https://github.com/Pav1un/RSTEG.
field. Segment of transport layer starts with two highlighted

Figure 4. Algorithm from the program point of view


4 D. Pavlin and A. Makosiy: About Software Implementation of Network Steganography Retransmission Based Algorithm

have to analyze traffic of a large hub.


Because the checksum of the retransmitted packet
generated by RSTEG is different from that of the original
packet, one can make the detection just by comparing the
captured retransmitted checksum with that of the recoded one.
Figure 5. Frame with legitimate data
So, it is possible to modify implementation of this method, so
that except a payload field, the checksum is also changed [6].

Figure 6. Frame with steganogram


References
[1] W. Mazurczyk, M.Smolarczyk, K.Szczypiorski,
5. Conclusion “Retransmission steganography and its detection,” Soft
Computing, ISSN: 1432-7643 (print version), ISSN:
As shown in [5] total Internet traffic contains about 7% 1433-7479 (electronic version), Journal no. 500, Springer,
November 2009.
retransmission data network caused by excessive delays or
packet reordering. It is necessary to use RSTEG method [2] D. Wetherall, A. Tanenbaum, (2011). Computer networks.
taking into account this fact, so as not to arouse suspicion at a Upper Saddle River, NJ: Pearson Prentice Hall. ISBN
listening side, it is best to do 2-4 messages with steganogram 0-13-212695-8.
on 100 legitimately transferred messages. [3] SharpPcap library, http://sourceforge.net/projects/sharppcap/
To complicate the task of listening side it is possible to send
a key periodically, which will run dropping packets routine, [4] WinDivert library, http://reqrypt.org/windivert.html
thus causing repeated messages. That way we increase the cost [5] C. Chen, M. Mangrulkar, N. Ramos and M. Sarkar. Trends in
of the analysis of retransmission packets that don't carry a TCP/IP Retransmissions and Resets, Technical Report,
secret message. http://cseweb.ucsd.edu/classes/wi01/cse222/projects/reports/tc
A variation of RSTEG steganalysis is a statistical analysis p-flags-13.pdf
of all retransmission packets for this session and selection [6] Jiangtao Zhai, Guangjie Liu, Yuewei Dai. An Improved
adjacent, repeatedly sent messages with different payload Retransmission-based Network Steganography: Design and
fields. But this tremendously reduces speed, especially if we Detection. Journal of Networks, Vol. 8, No 1 (2013), 182-188,
Jan 2013.

You might also like