Submit manuscript...
eISSN: 2574-8092

International Robotics & Automation Journal

Research Article Volume 9 Issue 1

Method for calculation indicators steganographic systems in multiservice communication networks

Bayram Ibrahimov

Department of Radio Engineering and Telecommunication, Azerbaijan

Correspondence: Bayram Ibrahimov, Department of Radio Engineering and Telecommunication, Azerbaijan Technical University, Baku, Azerbaijan, Tel 99470-649-07-79

Received: March 13, 2023 | Published: March 30, 2023

Citation: Ibrahimov B. Method for calculation indicators steganographic systems in multiservice communication networks. Int Rob Auto J. 2023;9(1):40-43. DOI: 10.15406/iratj.2023.09.00261

Download PDF

Abstract

An analysis of the performance indicators multiservice telecommunication networks using the sixth technological order based on the NGN (Next Generation Network) architectural concept and future FN (Future Networks) networks was carried out to build high-performance steganographic systems with increased covert channels throughput, ensuring the achievement of a certain level information security. Comprehensive criteria for the efficiency the functioning steganographic systems are considered and the channel capacity of the steganosystem as a communication system with packet switching is selected. On the basis of the study, a new approach to constructing a method for evaluating complex indicators of the quality of steganographic communication during embedding and extracting hidden data is proposed. The quality of steganographic communication refers to the properties stegano communication to ensure the efficiency of the system, both timely and reliable transmission of messages.

On the basis of the proposed approach, the effectiveness steganographic systems in the construction of covert channels for the transmission secret data transmitted over communication channels was studied. Taking into account the new entropy approach, a method for calculating the indicators of the latent throughput steganographic systems in packet-switched communication networks has been created. As a result of the study calculation method, important analytical expressions were obtained for evaluating complex indicators throughput steganographic systems, such as the throughput of covert channels, the maximum possible value of the performance of a binary source packets, the average packet transmission time with the proposed coding scheme, and the residual throughput of the communication channel.

Keywords: steganographic communication quality, steganographic system, covert channel, packet length, countermeasures, efficiency, residual throughput

Introduction

The intensive development multiservice telecommunication networks based on the concepts of the digital economy, the Fourth Industrial Revolution and the sixth technological order requires the construction steganographic systems with increased capacity of covert channels, ensuring the achievement of a certain level information security.

The studies carried out in1,2,3 show that multiservice telecommunication networks based on the architectural concepts of the next NGN and future FN generations are today a particularly vulnerable place for information security violations. In this case, it is impossible to guarantee the safety of data during their passage through public media such as electrical and optical communication channels, the Internet, terrestrial, wireless, and space channels. Therefore, messages transmitted over various telecommunication channels using advanced technologies are in particular need to protect information from unauthorized subscriber and network access.

Currently, there are two main directions in solving the problem of protecting information from unauthorized access:2‒5 cryptography and steganography. The purpose cryptography is to hide the content of a message through encryption. Steganography hides the very fact of the existence and transmission of a secret message through covert channels. In this case, not only is the fact forwarding some secret message from Alice to Bob hidden, but Eve does not even know that Alice is communicating with Bob.

The construction of covert channels and ensuring the security of information using the methods, algorithms and tools steganographic systems is an extremely urgent task in telecommunication systems.1,4‒ 6

Thus, steganography studies the methods by which the very fact of the transmission multimedia type information is concealed. The studied methods have shown1‒4,6,7 that steganography allows not only covert transmission multimedia data L i M MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaamitaO Waa0baaSqaaKqzadGaamyAaaWcbaqcLbmacaWGnbaaaaaa@3CCC@ , but also to solve the problems of noise-immune authentication, protection of information from unauthorized subscriber and network access, tracking the dissemination information over multiservice telecommunication networks, information search in multimedia databases.

The analysis of publications devoted to steganography allows us to single out works1‒3 published in the territory of the CIS (Countries of Independent States) and foreign countries as the base ones both in terms time of their publication, the number citations, the volume of the material presented, and in terms of the number analyzed and systematized literature sources on selected problem.4‒8 These works outline the approaches, principles and tasks steganography and steg analysis as a communication system.9‒12 There are also known approaches to estimating the capacity of covert channels with noise using information theory methods.6,8‒10

In this paper, we consider the problem of studying the principle constructing covert channels in multi-service packet-switched telecommunication networks with the introduction methods for countering and estimating the indicators maximum throughput.

Statement of the research problem

It is known1‒4,6,7 that information is presented in the form messages and transmitted in the form of a sequence characters. From the source to the receiver, the message is transmitted through some material medium, which is a communication channel. In steganographic systems, a discrete channel is widely used - this is a communication channel used to transmit discrete messages. Usually, a discrete channel is a set technical means that ensure the transmission of a digital signal. On the basis of a discrete channel, a covert communication channel is implemented to transmit secret messages in the form of a container package.1,2

It should be noted that a covert channel is a telecommunications communication channel that sends information using a different method and algorithm, which was not originally intended for this.1‒8,10‒12 It is generally accepted that a covert channel is a kind disguised, unauthorized transmission messages to a third party that violates the system security policy. However, covert channels can also be used by authorized users using steganographic methods and algorithms, which are based on the features of the presentation messages transmitted to communication channels.1‒5,12

In this case, a hidden message of a multimedia type means a variety of methods that modify data and programs, text, audio and video. Strictly speaking, this variant refers to hiding information in text documents, hiding data in speech messages and hiding information in video data or moving images (Data, Audio, Video - D, A, V). Covert channel stegomethods use mainly text, audio and video data as a container.

Due to the fact that the organization hidden attachments is possible mainly due to the redundancy of the type data that is chosen by the carrier, the popularity of using audio and video data for this task is obvious, as the most redundant. Then, when using container packet technology, the length of the hidden message multimedia type is expressed as

L k M = i=1 K L i.k = L i.k D + L i.k A + L i.k V ,i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadYeadaqhaa WcbaGaam4Aaaqaaiaad2eaaaGccqGH9aqpdaaeWbqaaaWcbaGaamyA aiabg2da9iaaigdaaeaacaWGlbaaniabggHiLdGccaWGmbWaaSbaaS qaaiaadMgacaGGUaGaam4AaaqabaGccqGH9aqpcaWGmbWaa0baaSqa aiaadMgacaGGUaGaam4AaaqaaiaadseaaaGccqGHRaWkcaWGmbWaa0 baaSqaaiaadMgacaGGUaGaam4AaaqaaiaadgeaaaGccqGHRaWkcaWG mbWaa0baaSqaaiaadMgajugWaiaac6cacaWGRbaaleaacaWGwbaaaO GaaiilaKqzGeGaamyAaiabg2da9OWaa0aaaeaajugibiaaigdacaaM c8UaaiilaiaaykW7caWGlbaaaaaa@5EA3@   (1)

Based on (1), we assume that during the transmission of hidden information in voice messages 20 ms, a packet is formed from 160bayt MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaaigdacaaI2a GaaGimaiaaykW7caWGIbGaamyyaiaadMhacaWG0baaaa@3E92@ , every time one information Δ t k =125mks MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiabfs5aejaads hadaWgaaWcbaGaam4AaaqabaGccqGH9aqpcaaIXaGaaGOmaiaaiwda caaMc8UaamyBaiaadUgacaWGZbaaaa@4234@ is written to the container 1bayt MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaaigdacaaMc8 UaamOyaiaadggacaWG5bGaamiDaaaa@3D18@ . Therefore, instead of streams of traffic packets, streams of container packets are considered.1,3,5

In multiservice networks with packet switching, covert channels are widely used technologies and protocol stack MPLS (MultiProtocol Label Switching) TCP/IP (Transport Control Protocol/Internet Protocol) and IP/MPLS(Internet Protocol/MPLS). The IP/MPLS header consists several labels, like a service packet.

Research and evaluation of the effectiveness steganographic systems

One of the important criteria for the effectiveness of the functioning steganographic systems is the channel bandwidth of the steganosystem as a communication system with packet switching and is described by the following relationship:

E эфф. ( λ i , L i )=W[ C max ck ( L ik , λ i.k )],i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadweadaWgaa WcbaGaamyteiaadsebcaWGerGaaiOlaaqabaGccaGGOaGaeq4UdW2a aSbaaSqaaiaadMgaaeqaaOGaaiilaiaaykW7caWGmbWaaSbaaSqaai aadMgaaeqaaOGaaiykaiabg2da9iaadEfacaaMc8UaaGPaVlaacUfa caWGdbWaa0baaSqaaiGac2gacaGGHbGaaiiEaaqaaiaadogacaWGRb aaaOGaaiikaiaadYeadaWgaaWcbaGaamyAaiaadUgaaeqaaOGaaiil aiaaykW7cqaH7oaBdaWgaaWcbaGaamyAaiaac6cacaWGRbaabeaaki aacMcacaGGDbGaaiilaiaadMgacqGH9aqpdaqdaaqaaiaaigdacaaM c8UaaiilaiaaykW7caWGlbaaaaaa@62ED@   (2)

where E эфф. ( λ i , L i ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadweadaWgaa WcbaGaamyteiaadsebcaWGerGaaiOlaaqabaGccaGGOaGaeq4UdW2a aSbaaSqaaiaadMgaaeqaaOGaaiilaiaaykW7caWGmbWaaSbaaSqaai aadMgaaeqaaOGaaiykaiabgkHiTaaa@447E@  functions that take into account the performance indicators of the functioning steganographic systems as communication systems, taking into account the rate arrival of the incoming stream λi when transmitting the stream of the i-th packet of the traffic container with the length of the hidden message L i , 1,K ¯ ; C max ck ( L i.k , λ i.k ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaamitaO WaaSbaaSqaaiaadMgaaeqaaOGaaiilamaanaaabaqcLbsacaaIXaGa aGPaVlaacYcacaaMc8Uaam4saaaakiaacUdacaWGdbWaa0baaSqaai Gac2gacaGGHbGaaiiEaaqaaiaadogacaWGRbaaaOGaaiikaiaadYea daWgaaWcbaGaamyAaiaac6cacaWGRbaabeaakiaacYcacaaMc8Uaeq 4UdW2aaSbaaSqaaiaadMgacaGGUaGaam4AaaqabaGccaGGPaGaeyOe I0caaa@5343@  the maximum value of the throughput covert channel steganographic packet switched systems, taking into account the speed of the incoming stream λ i.k MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeq4UdW2aaS baaSqaaiaadMgacaGGUaGaam4Aaaqabaaaaa@3A67@  when transmitting a stream th container packets with length L i.k ,i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGPbGaaiOlaiaadUgaaeqaaOGaaiilaiaadMgacqGH9aqp daqdaaqaaiaaigdacaaMc8UaaiilaiaaykW7caWGlbaaaaaa@4194@ . The latter is determined by three indicators of the bandwidth of the channels of the steganosystem as a communication system:

C max ck ( L i.k , λ i.k )= C max оkc ( λ i , L i ) C max nk ( λ i.n , L i.n ) С max cл ( λ i.c , L i.c ),i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaam4yaiaadUgaaaGccaGGOaGa amitamaaBaaaleaacaWGPbGaaiOlaiaadUgaaeqaaOGaaiilaiaayk W7cqaH7oaBdaWgaaWcbaGaamyAaiaac6cacaWGRbaabeaakiaacMca cqGH9aqpcaWGdbWaa0baaSqaaiGac2gacaGGHbGaaiiEaaqaaiaad6 dbcaWGRbGaam4yaaaakiaacIcacqaH7oaBdaWgaaWcbaGaamyAaaqa baGccaGGSaGaaGPaVlaadYeadaWgaaWcbaGaamyAaaqabaGccaGGPa GaeyOeI0Iaam4qamaaDaaaleaaciGGTbGaaiyyaiaacIhaaeaacaWG UbGaam4AaaaakiaacIcacqaH7oaBdaWgaaWcbaGaamyAaiaac6caca WGUbaabeaakiaacYcacaaMc8UaamitamaaBaaaleaacaWGPbGaaiOl aiaad6gaaeqaaOGaaiykaiabgkHiTiaadgcbdaqhaaWcbaqcLbmaci GGTbGaaiyyaiaacIhaaSqaaiaadogacaWG7qaaaOGaaiikaiabeU7a SnaaBaaaleaacaWGPbGaaiOlaiaadogaaeqaaOGaaiilaiaaykW7ca WGmbWaaSbaaSqaaiaadMgacaGGUaGaam4yaaqabaGccaGGPaGaaiil aiaadMgacqGH9aqpdaqdaaqaaiaaigdacaaMc8UaaiilaiaaykW7ca WGlbaaaaaa@85A7@   (3)

where C max оkc ( λ i , L i ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaam4qamaaDa aaleaaciGGTbGaaiyyaiaacIhaaeaacaWG+qGaam4AaiaadogaaaGc caGGOaGaeq4UdW2aaSbaaSqaaiaadMgaaeqaaOGaaiilaiaaykW7ca WGmbWaaSbaaSqaaiaadMgaaeqaaOGaaiykaiabgkHiTaaa@45B7@  total maximum throughput of a communication system using packet-switched steganography systems, taking into account the incoming flow rates λ i MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeq4UdW2aaS baaSqaaiaadMgaaeqaaaaa@38C5@  when transmitting the stream of the i-th packet with length L i ,i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGPbaabeaakiaacYcacaWGPbGaeyypa0Zaa0aaaeaacaaI XaGaaGPaVlaacYcacaaMc8Uaam4saaaaaaa@3FF2@ ; C max nk ( λ i.n , L i.n )and С max c e ¨ ( λ i.c , L i.c ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOBaiaadUgaaaGccaGGOaGa eq4UdW2aaSbaaSqaaiaadMgacaGGUaGaamOBaaqabaGccaGGSaGaaG PaVlaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacMca caaMc8UaaGPaVlaadggacaWGUbGaamizaiaaykW7caaMc8Uaamyiem aaDaaaleaaciGGTbGaaiyyaiaacIhaaeaacaWGJbGabmyzayaadaaa aOGaaiikaiabeU7aSnaaBaaaleaacaWGPbGaaiOlaiaadogaaeqaaO GaaiilaiaaykW7caWGmbWaaSbaaSqaaiaadMgacaGGUaGaam4yaaqa baGccaGGPaGaeyOeI0caaa@6370@  respectively, the channel capacity of the communication system using steganographic systems (information or useful and service channels), taking into account the speed of the incoming stream λ i.n and λ i.c MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeq4UdW2aaS baaSqaaiaadMgacaGGUaGaamOBaaqabaGccaaMc8Uaamyyaiaad6ga caWGKbGaaGPaVlabeU7aSnaaBaaaleaacaWGPbGaaiOlaiaadogaae qaaaaa@44B4@  when transmitting the stream of the i-th packet with length L i.n and L i.c MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGPbGaaiOlaiaad6gaaeqaaOGaaGPaVlaadggacaWGUbGa amizaiaaykW7caWGmbWaaSbaaSqaaiaadMgacaGGUaGaam4yaaqaba aaaa@42EE@ .

Expressions (1), (2) and (3) characterize the general essence of the efficiency of a steganographic system, taking into account the parameters packets, indicators useful, service and covert communication channels, which make it possible to describe the considered new approach to constructing a method for assessing the quality of steganosystem when embedding and extracting hidden data.

Analysis of indicators residual system throughput

To build a covert channel, a counteraction method was used based on changing the length of each transmitted packet (useful and service), which has a uniform distribution on the set N α b ф {0} MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamOtaiabeg 7aHnaaDaaaleaacaWGIbaabaGaamireaaakiablQIivjaacUhacaaI WaGaaiyFaaaa@3E40@ , which create an additional load on the common communication channel. An important question that arises in this case is the estimation of the residual throughput steganographic systems when introducing a method for changing the field of a useful and service packet of a hidden message and is equal to:

C max res ( L i.n )= C max okc ( λ i , L i ) L i.п + L cnу ( λ i ) ( L i.n + L i.c ),i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGa aiikaiaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacM cacqGH9aqpdaWcaaqaaiaadoeadaqhaaWcbaGaciyBaiaacggacaGG 4baabaGaam4BaiaadUgacaWGJbaaaOGaaiikaiabeU7aSnaaBaaale aacaWGPbaabeaakiaacYcacaaMc8UaamitamaaBaaaleaacaWGPbaa beaakiaacMcaaeaacaWGmbWaaSbaaSqaaiaadMgacaGGUaGaam4pea qabaGccqGHRaWkcaWGmbWaaSbaaSqaaiaadogacaWGUbGaam4qeaqa baGccaGGOaGaeq4UdW2aaSbaaSqaaiaadMgaaeqaaOGaaiykaaaacq GHflY1caGGOaGaamitamaaBaaaleaacaWGPbGaaiOlaiaad6gaaeqa aOGaey4kaSIaamitamaaBaaaleaacaWGPbGaaiOlaiaadogaaeqaaO GaaiykaiaacYcacaWGPbGaeyypa0Zaa0aaaeaacaaIXaGaaGPaVlaa cYcacaaMc8Uaam4saaaaaaa@72A7@   (4)

where L cnу ( λ i ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGJbGaamOBaiaadoebaeqaaOGaaiikaiabeU7aSnaaBaaa leaacaWGPbaabeaakiaacMcacqGHsislaaa@3EC3@  the length of the service transmitted packet, taking into account the protocol unit and the control field of the information packet network and link level of the model.

Expression (4) characterizes the residual capacity steganographic systems with the introduction of the method changing the field of the useful and service packet of the covert message and determines the potential of the covert channel.

Taking into account the uniform distribution of the symbol transmitted over the covert channel (due to the largest uncertainty - entropy) and the parameter of the counteraction approach α b ф MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaaaa@3977@ , expression (4) will take the following form [6, 8, 9]:

C max res ( L i.n )= C max okc ( λ i , L i ) E[ L i ]+ L уу (k)+0,5 α b ф E[ L i ],i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGa aiikaiaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacM cacqGH9aqpdaWcaaqaaiaadoeadaqhaaWcbaGaciyBaiaacggacaGG 4baabaGaam4BaiaadUgacaWGJbaaaOGaaiikaiabeU7aSnaaBaaale aacaWGPbaabeaakiaacYcacaaMc8UaamitamaaBaaaleaacaWGPbaa beaakiaacMcaaeaacaWGfbGaai4waiaadYeadaWgaaWcbaGaamyAaa qabaGccaGGDbGaey4kaSIaamitamaaBaaaleaacaWGdrGaam4qeaqa baGccaGGOaGaam4AaiaacMcacqGHRaWkcaaIWaGaaiilaiaaiwdaca aMc8UaeqySde2aa0baaSqaaiaadkgaaeaacaWGeraaaaaakiabgwSi xlaadweacaGGBbGaamitamaaBaaaleaacaWGPbaabeaakiaac2faca GGSaGaamyAaiabg2da9maanaaabaGaaGymaiaaykW7caGGSaGaaGPa VlaadUeaaaaaaa@73FB@   (5)

where E[ L i ] MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamyraiaacU facaWGmbWaaSbaaSqaaiaadMgaaeqaaOGaaiyxaiabgkHiTaaa@3B63@  average length of total transmitted packets over a communication channel;

α b ф MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaOGaeyOeI0caaa@3A6E@ the number of code element in the implementation dummy bits per packet, determined by the values of a random variable that has a uniform distribution on the set N α b ф {0} MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamOtaiabeg 7aHnaaDaaaleaacaWGIbaabaGaamireaaakiablQIivjaacUhacaaI WaGaaiyFaaaa@3E40@ .

Expression (5) determines the loss of the total throughput network steganography as a communication system when using the countermeasure method.

Among the ways to counter information leakage through network covert channels, it is customary to single out detection, elimination, and throughput limitation.3,8

Based on the entropy approach in the absence restrictions on the value of the variance σ 2 MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeq4Wdm3aaW baaSqabeaacaaIYaaaaaaa@38A3@  for a uniform distribution F(x)=1/( a ^ а) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadAeacaGGOa GaamiEaiaacMcacqGH9aqpcaaIXaGaai4laiaacIcaceWGHbGbaKaa cqGHsislcaWGWqGaaiykaaaa@4098@  has the maximum entropy H Vmax =lo g 2 ( a ^ а) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadIeadaWgaa WcbaGaamOvaiGac2gacaGGHbGaaiiEaaqabaGccqGH9aqpcqWItecB caWGVbGaam4zamaaBaaaleaacaaIYaaabeaakiaacIcaceWGHbGbaK aacqGHsislcaWGWqGaaiykaaaa@44BE@ . Given the last assumption and the duration of the transmission of one message i-th packets T( λ i ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamivaiaacI cacqaH7oaBdaWgaaWcbaGaamyAaaqabaGccaGGPaaaaa@3B01@ , the maximum possible value of the performance of the packet source is determined as follows:

I n.max ( λ i )=[ H Vmax /T( λ i )]< C max ck ( L i.k , λ i.k ),i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadMeadaWgaa WcbaGaamOBaiaac6caciGGTbGaaiyyaiaacIhaaeqaaOGaaiikaiab eU7aSnaaBaaaleaacaWGPbaabeaakiaacMcacqGH9aqpcaGGBbGaam isamaaBaaaleaacaWGwbGaciyBaiaacggacaGG4baabeaakiaac+ca caWGubGaaiikaiabeU7aSnaaBaaaleaacaWGPbaabeaakiaacMcaca GGDbGaeyipaWJaam4qamaaDaaaleaaciGGTbGaaiyyaiaacIhaaeaa caWGJbGaam4AaaaakiaacIcacaWGmbWaaSbaaSqaaiaadMgacaGGUa Gaam4AaaqabaGccaGGSaGaaGPaVlabeU7aSnaaBaaaleaacaWGPbGa aiOlaiaadUgaaeqaaOGaaiykaiaacYcacaWGPbGaeyypa0Zaa0aaae aacaaIXaGaaGPaVlaacYcacaaMc8Uaam4saaaaaaa@684B@   (6)

The fulfillment condition (6) means that the system has a method for optimal coding and decoding data (an efficient method modulation and coding, a signal-code design) transmitted via covert channels, in which the error probability is arbitrarily small  P BER ск 0, H V (U)=0 MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamiuamaaDa aaleaacaWGcbGaamyraiaadkfaaeaacaWGbrGaamOoeaaakiabgkzi UkaaicdacaGGSaGaamisamaaBaaaleaacaWGwbaabeaakiaacIcaca WGvbGaaiykaiabg2da9iaaicdaaaa@4420@ .

Based on the new approach and using expressions (6), we obtain in a compact form the formula for the maximum value of the covert channel throughput:

C max ck ( L i.k , λ i.k )= lo g 2 L уу (k) E[ T n ( λ i , L i )] ,i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaam4yaiaadUgaaaGccaGGOaGa amitamaaBaaaleaacaWGPbGaaiOlaiaadUgaaeqaaOGaaiilaiaayk W7cqaH7oaBdaWgaaWcbaGaamyAaiaac6cacaWGRbaabeaakiaacMca cqGH9aqpdaWcaaqaaiabloriSjaad+gacaWGNbWaaSbaaSqaaiaaik daaeqaaOGaamitamaaBaaaleaacaWGdrGaam4qeaqabaGccaGGOaGa am4AaiaacMcaaeaacaWGfbGaai4waiaadsfadaWgaaWcbaGaamOBaa qabaGccaGGOaGaeq4UdW2aaSbaaSqaaiaadMgaaeqaaOGaaiilaiaa ykW7caWGmbWaaSbaaSqaaiaadMgaaeqaaOGaaiykaiaac2faaaGaai ilaiaadMgacqGH9aqpdaqdaaqaaiaaigdacaaMc8UaaiilaiaaykW7 caWGlbaaaaaa@6752@   (7)

Expression (7) takes into account the indicators of covert channel, the lengths of the network and link layer headers open systems interaction model and is described in a very compact way in comparison with the works obtained by the formula for the covert channel throughput [1, 3, 8, 10].

For engineering calculation, taking into account covert channel indicators α b ф MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaaaa@3977@ and L уу (k) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGdrGaam4qeaqabaGccaGGOaGaam4AaiaacMcaaaa@3ADF@ , and also with the considered method counteraction, the residual channel throughput is as follows:

C max res ( L i.n )= 2 C max okc ( λ i , L i ) 2E[ L i ]+ L уу (k)( α b o ^ +1) E[ L i ],i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGa aiikaiaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacM cacqGH9aqpdaWcaaqaaiaaikdacaWGdbWaa0baaSqaaiGac2gacaGG HbGaaiiEaaqaaiaad+gacaWGRbGaam4yaaaakiaacIcacqaH7oaBda WgaaWcbaGaamyAaaqabaGccaGGSaGaaGPaVlaadYeadaWgaaWcbaGa amyAaaqabaGccaGGPaaabaGaaGOmaiaadweacaGGBbGaamitamaaBa aaleaacaWGPbaabeaakiaac2facqGHRaWkcaWGmbWaaSbaaSqaaiaa doebcaWGdraabeaakiaacIcacaWGRbGaaiykaiaacIcacaaMc8Uaeq ySde2aa0baaSqaaiaadkgaaeaaceWGVbGbaKaaaaGccqGHRaWkcaaI XaGaaiykaaaacqGHflY1caWGfbGaai4waiaadYeadaWgaaWcbaGaam yAaaqabaGccaGGDbGaaiilaiaadMgacqGH9aqpdaqdaaqaaiaaigda caaMc8UaaiilaiaaykW7caWGlbaaaaaa@7595@   (8)

Expression (8) determines the maximum value of the loss of the total throughput communication channel. In addition, (8) determines the capabilities of the steganography system in the transmission secret data, the efficiency use and potential resources of the covert channel.

Numerical results and interpretation

On the basis of the calculation method, a numerical assessment was made by modeling covert channel indicators in steganographic systems using the Communications Toolbox package - an extension of the standard Matlab environment, R 2019b, designed for calculating and modeling communication systems. The results obtained are explicitly listed in table 1.

The analysis shows that Table 1 shows the important values covert channel indicators, the total maximum value communication channel throughput for some values of the countermeasure method parameter α b ф MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaaaa@3977@ and the average length of the total transmitted packets over the communication channel.

Parameters of covert channel and protocol stack IP/MPLS steganography system

E[ L i ] MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaamyrai aaykW7caGGBbGaamitaSWaaSbaaeaajugWaiaadMgaaSqabaqcLbsa caGGDbaaaa@3F65@ , byte

64

100

128

256

328

400

512

640

C max oks ( λ i , L i ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaam4qaS Waa0baaeaajugWaiGac2gacaGGHbGaaiiEaaWcbaqcLbmacaWGVbGa am4AaiaadohaaaGccaGGOaGaeq4UdW2cdaWgaaqaaKqzadGaamyAaa WcbeaakiaacYcacaaMc8UaamitaSWaaSbaaeaajugWaiaadMgaaSqa baGccaGGPaaaaa@4B86@ ,

Kbyte /s

64

128

512

1024

2048

4096

8192

16384

L уу (k) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaamitaO WaaSbaaSqaaKqzadGaam4qeiaadoebaSqabaqcLbsacaGGOaGaam4A aiaacMcaaaa@3E4D@ , byte

5

10

15

20

25

30

32

35

C max res ( L i.n ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoealmaaDa aabaqcLbmaciGGTbGaaiyyaiaacIhaaSqaaKqzadGaamOCaiaadwga caWGZbaaaOGaaiikaKqzGeGaamitaSWaaSbaaeaajugWaiaadMgaca GGUaGaamOBaaWcbeaakiaacMcaaaa@46DC@ ,

Kbyte /s

55,35

35,16

91,43

50,69

330,99

55,28

736,36

199,58

1466,69

217,36

2925,71

314,32

5637,51

604,54

11335,96

1114,62

Relative residual capacity

ΔQ( L i.n ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiabfs5aejaadg facaGGOaGaamitamaaBaaaleaacaWGPbGaaiOlaiaad6gaaeqaaOGa aiykaaaa@3E3D@ , %

 

63,52

 

55,44

 

16,70

 

15,10

 

14,82

 

10,74

 

   10,72

 

9,83

Table 1 Residual system throughput and covert channel parameters for α b ф =(16,...,500)bit MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqzGeGaeqySde 2cdaqhaaqaaKqzadGaamOyaaWcbaqcLbmacaWGeraaaKqzGeGaeyyp a0JaaiikaiaaigdacaaI2aGaaiilaiaac6cacaGGUaGaaiOlaiaacY cacaaI1aGaaGimaiaaicdacaGGPaGaaGPaVlaadkgacaWGPbGaamiD aaaa@4BEF@ .

Thus, from numerical calculations it follows that with an increase in the parameters of the covert channel and the IP/MPLS protocol stack of the steganography system, the maximum value of the residual throughput of the system increases, which meets the requirements for the quality of steganographic communication.

Based on the results modeling covert channel indicators, Figure 1 plots a graphical dependence of the maximum value of the residual system throughput on the covert channel parameter for a given indicator of packet-switched communication networks.

Figure 1 Graphic dependence of the maximum value of the residual throughput system on the parameter covert channel packet switched communication networks.

Graphical dependency analysi C max res ( L i.n )=F{ C max okc ( λ i , L i ), α b ф ,E[ L i ]} MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGa aiikaiaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacM cacqGH9aqpcaWGgbGaai4EaiaaykW7caWGdbWaa0baaSqaaiGac2ga caGGHbGaaiiEaaqaaiaad+gacaWGRbGaam4yaaaakiaacIcacqaH7o aBdaWgaaWcbaGaamyAaaqabaGccaGGSaGaaGPaVlaadYeadaWgaaWc baGaamyAaaqabaGccaGGPaGaaiilaiaaykW7cqaHXoqydaqhaaWcba GaamOyaaqaaiaadsebaaGccaGGSaGaaGPaVlaaykW7caWGfbGaai4w aiaadYeadaWgaaWcbaGaamyAaaqabaGccaGGDbGaaiyFaaaa@6513@  indicates that an increase in the covert channel parameter α b ф MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaaaa@3977@ , leads to a decrease C max res ( L in )(2000,...,1960) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGa aiikaiaadYeadaWgaaWcbaGaamyAaiaad6gaaeqaaOGaaiykaiabgs MiJkaacIcacaaIYaGaaGimaiaaicdacaaIWaGaaiilaiaac6cacaGG UaGaaiOlaiaacYcacaaIXaGaaGyoaiaaiAdacaaIWaGaaiykaaaa@4E61@ Kbps a system that meets the quality requirements of steganographic communication when using methods to counter the specified type covert of channels, by randomly changing the parameters packets and communication channels.

In addition, from Fig. 1 it follows that the desired value C max ocm ( L in ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaam4qamaaDa aaleaaciGGTbGaaiyyaiaacIhaaeaacaWGVbGaam4yaiaad2gaaaGc caGGOaGaamitamaaBaaaleaacaWGPbGaamOBaaqabaGccaGGPaaaaa@40D9@  and its noticeable change begins with the values α b ф (100,...,150) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaOGaeyyzImRaaGPaVlaaykW7caGG OaGaaGymaiaaicdacaaIWaGaaiilaiaac6cacaGGUaGaaiOlaiaacY cacaaIXaGaaGynaiaaicdacaGGPaaaaa@478F@ bit at E[ L i ]2000bit MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamyraiaacU facaWGmbWaaSbaaSqaaiaadMgaaeqaaOGaaiyxaiabgwMiZkaaikda caaIWaGaaGimaiaaicdacaaMc8UaaGPaVlaadkgacaWGPbGaamiDaa aa@450A@  and  C max oks ( λ i , L i )2048Kbps MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaam4BaiaadUgacaWGZbaaaOGa aiikaiabeU7aSnaaBaaaleaacaWGPbaabeaakiaacYcacaaMc8Uaam itamaaBaaaleaacaWGPbaabeaakiaacMcacqGHLjYScaaIYaGaaGim aiaaisdacaaI4aGaaGPaVlaadUeacaWGIbGaamiCaiaadohaaaa@5009@ .

Efficiency use and distribution throughput system resources steganographic systems

Based on the method calculation and analysis (3), it is possible to determine the maximum value of the covert channel bandwidth steganographic packet-switched systems:

C max ck ( L i.k , λ i.k )= C max okc ( λ i , L i.k ) C max res ( L i.n ),i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaam4yaiaadUgaaaGccaGGOaGa amitamaaBaaaleaacaWGPbGaaiOlaiaadUgaaeqaaOGaaiilaiaayk W7cqaH7oaBdaWgaaWcbaGaamyAaiaac6cacaWGRbaabeaakiaacMca cqGH9aqpcaWGdbWaa0baaSqaaiGac2gacaGGHbGaaiiEaaqaaiaad+ gacaWGRbGaam4yaaaakiaacIcacqaH7oaBdaWgaaWcbaGaamyAaaqa baGccaGGSaGaaGPaVlaadYeadaWgaaWcbaGaamyAaiaac6cacaWGRb aabeaakiaacMcacqGHsislcaWGdbWaa0baaSqaaiGac2gacaGGHbGa aiiEaaqaaiaadkhacaWGLbGaam4CaaaakiaacIcacaWGmbWaaSbaaS qaaiaadMgacaGGUaGaamOBaaqabaGccaGGPaGaaiilaiaadMgacqGH 9aqpdaqdaaqaaiaaigdacaaMc8UaaiilaiaaykW7caWGlbaaaaaa@6E98@   (9)

One of the criteria that allows one to compare the efficiency allocating bandwidth resources of covert data transmission systems is the ratio C max res ( L i.n ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaam4qamaaDa aaleaaciGGTbGaaiyyaiaacIhaaeaacaWGYbGaamyzaiaadohaaaGc caGGOaGaamitamaaBaaaleaacaWGPbGaaiOlaiaad6gaaeqaaOGaai ykaaaa@4196@ to the total throughput communication systems C max okc ( λ i , L i ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaam4qamaaDa aaleaaciGGTbGaaiyyaiaacIhaaeaacaWGVbGaam4AaiaadogaaaGc caGGOaGaeq4UdW2aaSbaaSqaaiaadMgaaeqaaOGaaiilaiaaykW7ca WGmbWaaSbaaSqaaiaadMgaaeqaaOGaaiykaaaa@44F7@ :

ΔQ( L i.n )=1 C max res ( L i.n ) C max okc ( λ i , L i.k ) ,i= 1,K ¯ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiabfs5aejaadg facaGGOaGaamitamaaBaaaleaacaWGPbGaaiOlaiaad6gaaeqaaOGa aiykaiabg2da9iaaigdacqGHsisldaWcaaqaaiaadoeadaqhaaWcba GaciyBaiaacggacaGG4baabaGaamOCaiaadwgacaWGZbaaaOGaaiik aiaadYeadaWgaaWcbaGaamyAaiaac6cacaWGUbaabeaakiaacMcaae aacaWGdbWaa0baaSqaaiGac2gacaGGHbGaaiiEaaqaaiaad+gacaWG RbGaam4yaaaakiaacIcacqaH7oaBdaWgaaWcbaGaamyAaaqabaGcca GGSaGaamitamaaBaaaleaacaWGPbGaaiOlaiaadUgaaeqaaOGaaiyk aaaacaGGSaGaamyAaiabg2da9maanaaabaGaaGymaiaaykW7caGGSa GaaGPaVlaadUeaaaaaaa@63B7@   (10)

Expressions (9) and (10) allow estimating the channel resources, temporal and informative characteristics of the covert channel of steganographic systems.

Thus, the performed analysis shows that the possible scenarios for the efficient use covert channel resources in network steganography are not limited to those described in this section.

Conclusion

As a result of the study, a new approach was proposed to create a method for calculating the throughput of covert channel steganographic systems, taking into account the performance indicators packet switched communication networks, methods counteraction control and distribution communication channel resources. On the basis of the calculation method, analytical expressions were obtained for estimating the indicators of the residual system throughput and the average packet transmission time, taking into account the covert channel parameter and the IP/MPLS protocol stack of the steganography system.

The indicators Table 1 and the graphic dependence of the maximum residual throughput on the covert channel parameter are analyzed. It has been established that a strong dependence covert channel throughput C max ck ( L in ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqkY=Mj0xXdbba91rFfpec8Eeeu0xXdbba9frFj0=OqFf ea0dXdd9vqaq=JfrVkFHe9pgea0dXdar=Jb9hs0dXdbPYxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaiaadoeadaqhaa WcbaGaciyBaiaacggacaGG4baabaGaam4yaiaadUgaaaGccaGGOaGa amitamaaBaaaleaacaWGPbGaamOBaaqabaGccaGGPaaaaa@40FA@ of the total number parameters α b ф ,E[ L i ] MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaeqySde2aa0 baaSqaaiaadkgaaeaacaWGeraaaOGaaiilaiaadweacaGGBbGaamit amaaBaaaleaacaWGPbaabeaakiaac2faaaa@3EB0@ and L уу (k) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVu0Je9sqqrpepC0xbbL8F4rqqrFfpeea0xe9Lq=Jc9 vqaqpepm0xbba9pwe9Q8fs0=yqaqpepae9pg0FirpepeKkFr0xfr=x fr=xb9adbaqaaeGaciGaaiaabeqaamaabaabaaGcbaGaamitamaaBa aaleaacaWGdrGaam4qeaqabaGccaGGOaGaam4AaiaacMcaaaa@3ADF@  is the main disadvantage steganographic systems using a packet switched communication network and this countermeasure method.

As a result, the throughput of the covert channel, the reliability network operation and protection against unauthorized access along the perimeter subscriber and network communication lines are significantly reduced.

Acknowledgments

None.

Conflicts of interest

Author declares that there is no conflict of interest.

References

  1. Ibrahimov BG, İsayev YS, Aydemir ME. Performance of multi service telecommunication systems using the architectural concept of future networks. Journal of Aeronautics and Space Technologies. 2023;16(1):41‒49 p.
  2. Korzhik VI, Yakovlev VA. Fundamentals of cryptography:SP :NTs Intermedia. 2016;1–296 p.
  3. Ibrahimov BG, Jafarova EM. Analysis of information security methods in telecommunication systems using quantum cryptography. Proceedings of the VIII International Conference Technical Universities: Integration with European and World Education Systems. Izhevsk TU. Russia, Izhevsk. 2019;404–410 p.
  4. Shelukhin OI, Kanaev SD. Steganography algorithms and software implementation M: Hotline –Telecom:2018;1–592 p.
  5. Belozubova AI, Kogos KG, Lebedev PV. Network covert channels capacity limitation by adding random delays before packet sending. IT Security. 2021;28(4):74–89p.
  6. Ibrahimov BG, Takhirova KM. Analysis information security indicators based on network steganography technology. Collection of scientific articles - X-International scientific-technical and scientific-methodical conference. Actual problems of info telecommunications in science and  education. SPb : SPbGUT. 2021;411–416 p.
  7. Ahsan K, Kundur D. Practical data hiding in TCP/IP. Proceedings of the ACM Workshop on Multimedia Security. 2002: 866‒870 p.
  8. Cabuk S, Brodley CE, Shields C. IP covert timing channels: design and detection. Proceedings of the eleventh ACM conference on computer and communications security. 2004;178‒187p.
  9. Grusho AA. On the existence of hidden channels. Discrete Mathematics.1999;11(1):24–28 p.
  10. Ibrahimov BG. Research and estimation characteristics of terminal equipment a part of multiservice communication networks. Automatic Control and Computer Sciences. 2010;48(6):54‒59 p.
  11. Lampson BWA. Note on the Confinement Problem. Communications of the ACM. 1973;613–615 p.
  12. Ibrahimov BG, Takhirova KM. Research and analysis of information hiding methods in the spatio-temporal domain using steganographic technologies. Scientific journal Problems of info communications. 2022;2(16):39–45 p.
  13. Ibrаhimov BG, Namazov MB, Quliev MN. Analysis performance indicators network multiservice infrastructure using innovative technologies. Proceedings of the 7-th International Conference on Control and Optimization with Industrial Applications (COIA-20). 2020; II:176‒178 p.
Creative Commons Attribution License

©2023 Ibrahimov. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.