Network Steganography and Network Steganalysis

#Signal #Processing #Chapter #IEEE #North #Jersey #Section #Seminar #on #Network #Steganography #and #Steganalysis
Share

Internet has become part of our everyday life. The endless usage of computer networks makes network security the highest priority in communications. Network steganography is to transmit secret data within user’s normal data transmission without being detected by third parties, which is also called covert channels. Covert channels via network protocols have become a new challenge issue for network security. The huge amount of data transmitted over Internet by using TCP/IP protocols makes it ideal as a carrier in steganography. Attacks based on covert channels become a potential threat to the Internet. In this talk, we will briefly review network protocols and introduce network steganography, and network steganalysis. The information hiding in network protocols and the corresponding countermeasures or network steganalysis will be discussed. Finally, we will present our proposed detection method PRM (Phase Reconstruction Method) to detect covert channels in TCP ISNs and IP IDs.

  Date and Time

  Location

  Hosts

  Registration



  • Add_To_Calendar_icon Add Event to Calendar
  • 323 M. L. King Blvd
  • New Jersey Institute of Technology
  • Newark, New Jersey
  • United States 07102
  • Building: ECEC
  • Room Number: 212

  • Contact Event Host
  • Yun Q. Shi shi@njit.edu (973)-596-3501, Alfredo Tan tan@fdu.edu (201) 692-2347, and Hong Man hman@stevens-tech.edu (201)-216-5038.
  • Co-sponsored by ECE Department, NJIT
  • Starts 04 March 2011 03:00 PM UTC
  • Ends 04 March 2011 03:05 PM UTC
  • No Admission Charge


  Speakers

Dr. Hong Zhao of Fairleigh Dickinson University

Topic:

Network Steganography and Steganalysis

Biography:

Email:

Address:Tenafly, New Jersey, United States





Agenda

Speaker: Professor Hong Zhao, Fairleigh Dickinson University, New Jersey

Dr. Hong Zhao received the B.E from Taiyuan University of Technology, China, the M.S from Xian Jiaotong University, China, and the Ph. D from New Jersey Institute of Technology, respectively, all in Electrical Engineering. She is an Assistant Professor of Electrical and Computer Engineering at Fairleigh Dickinson University, New Jersey, US. Her primary research interests include network steganography and steganalysis, multimedia streaming over networks, and cross-layer design for wireless networks. She has served as a TPC member, technical paper reviewer and book reviewer for IEEE conferences, journal magazines and book publishers.