New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EtherIP: Tunneling Ethernet Frames in IP Datagrams

The EtherIP protocol is used to tunnel Ethernet [DIX] and IEEE 802.3 [CSMA/CD] media access control (MAC) frames (including IEEE 802.1Q [VLAN] datagrams) across an IP internet. Tunneling is usually performed when the layer three protocol carried in the MAC frames is not IP or when encryption obscures the layer three protocol control information needed for routing. EtherIP may be implemented in ...

متن کامل

Standard for the transmission of IP datagrams over NetBIOS networks

A Standard for the Transmission of IP Datagrams over NetBIOS Networks Status of this Memo This document specifies a standard method of encapsulating the Internet Protocol [1] (IP) datagrams on NetBIOS [2] networks. Distribution of this memo is unlimited.

متن کامل

Nonstandard for transmission of IP datagrams over serial lines: SLIP

The TCP/IP protocol family runs over a variety of network media: IEEE 802.3 (ethernet) and 802.5 (token ring) LAN’s, X.25 lines, satellite links, and serial lines. There are standard encapsulations for IP packets defined for many of these networks, but there is no standard for serial lines. SLIP, Serial Line IP, is a currently a de facto standard, commonly used for point-to-point serial connect...

متن کامل

RIM: Router Interface Marking for IP Traceback

Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network paths the attack traffic traverses. This paper presents a novel IP traceback scheme called Router Interface Marking (RIM). In RIM, a router probabilistically marks packets with a router interface’s identifier. After collecti...

متن کامل

Survey on Packet Marking Algorithms for IP Traceback

Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2012

ISSN: 2636-4441

DOI: 10.21608/iceeng.2012.30647