Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Stealthy Network Transfer of Data
Authors: N. Veerasamy, C. J. Cheyne
Abstract:
Users of computer systems may often require the private transfer of messages/communications between parties across a network. Information warfare and the protection and dominance of information in the military context is a prime example of an application area in which the confidentiality of data needs to be maintained. The safe transportation of critical data is therefore often a vital requirement for many private communications. However, unwanted interception/sniffing of communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the authors. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data.Keywords: Construction, encode, interception, stealthy.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1330029
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1196References:
[1] J. S. Quartermaan, and J. C. Hoskins, "Notable Computer Networks," Communications of the ACM, vol.29, pp 932-971, Oct. 1986.
[2] D. Gollman, "Computer Security," New York: John Wiley & Sons, 2002, pp 5-7.
[3] S. G├╝rses, J.H. Jahnke, C. Obrey, A. Onabajo, and T. Santen, "Eliciting confidentiality requirements in practice, " in Proc. 2005 conference of the Centre for Advanced Studies on Collaborative research, Ontario, 2005, pp. 101-116.
[4] M. R. Endsley, and W.M. Jones, "Situation Awareness Information Dominance & Information Warfare (Report style)", United States Air Force Armstrong Laboratory, Tech. Report 97-01, Feb. 1997.
[5] A. J. Elbirt, "Information Warfare: Are You at Risk?," IEEE Technology and Society Magazine, 2003/2004, pp. 13-19.
[6] B. Panda, and J. Giordano, "Defensive Information Warfare", Communications of the ACM, vol. 42, pp. 31- 32, July 1999.
[7] Unicode.org, "Basic Questions", Available: http://www.unicode.org/faq/basic.html.
[8] M. Wang, C. Su, and C. Wu, "A HMAC Processor with Integrated SHA- 1 and MD5 Algorithms," in Proc. Of the 2004 conference on Asia South Pacific design automation: electronic design and solution fair ASP-DAC 2004, pp. 456-458.
[9] R. L. Rivest, "The MD5 message digest algorithm," RFC 1321, the Internet Society, April 1992.
[10] M. Burnett, and D. Kleiman, "Perfect Passwords", Rockland: Syngress, 2006, pp. 53-59.
[11] A. Y. Fu, X. Deng, L. Wenyin, and G. Little, "The Methodology and Application to Fight Against Unicode Attacks," in Proc. of the second symposium on Usable privacy and security, Pennsylvania, pp 91-101.
[12] S. Hadaya, "Permutations", C# Crawler, Available: http://radio.weblogs.com/0111551/stories/2002/10/14/permutations .html.