Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
SIP steganalysis using chaos theory
Zhao H., Zhang X.  CMCSN 2012 (Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, Jul 7-9, 2012)95-100.2012.Type:Proceedings
Date Reviewed: Jan 24 2013

Steganography involves the concealment of unrelated information in a data stream. The authors of this paper propose the use of chaos theory to determine whether a certain information element used in session initiation protocol (SIP) signaling is carrying steganographic information. They use a simplistic distance-based metric to train a simple classification system that recognizes suspect, and therefore potentially steganographic, information elements with 91.9 percent efficacy.

While there does not appear to be anything overtly wrong with the experiment and the results in the paper, the larger question to me is why we should bother with detecting steganography in SIP. SIP has a rather expressive grammar that allows wide variability of representation in messages. As such, it is relatively easy to do steganography in SIP in many places. Trying to assume that steganography will happen only in certain information elements is futile. The expressive grammar, the extensibility of the protocol, the need for intermediaries to pass unknown headers and information elements unmodified, and the need to include various multipurpose Internet mail extensions (MIME) types, including allowing JPEG and GIF images that are already vectors for steganographic attacks, allow for a virtually unlimited canvas with which to mount steganographic attacks in SIP. Picking one or two headers and studying the effect of steganography on these is futile, in my humble opinion.

Reviewer:  Vijay Gurbani Review #: CR140866 (1305-0387)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy