New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field
نویسندگان
چکیده
منابع مشابه
EtherIP: Tunneling Ethernet Frames in IP Datagrams
The EtherIP protocol is used to tunnel Ethernet [DIX] and IEEE 802.3 [CSMA/CD] media access control (MAC) frames (including IEEE 802.1Q [VLAN] datagrams) across an IP internet. Tunneling is usually performed when the layer three protocol carried in the MAC frames is not IP or when encryption obscures the layer three protocol control information needed for routing. EtherIP may be implemented in ...
متن کاملStandard for the transmission of IP datagrams over NetBIOS networks
A Standard for the Transmission of IP Datagrams over NetBIOS Networks Status of this Memo This document specifies a standard method of encapsulating the Internet Protocol [1] (IP) datagrams on NetBIOS [2] networks. Distribution of this memo is unlimited.
متن کاملNonstandard for transmission of IP datagrams over serial lines: SLIP
The TCP/IP protocol family runs over a variety of network media: IEEE 802.3 (ethernet) and 802.5 (token ring) LAN’s, X.25 lines, satellite links, and serial lines. There are standard encapsulations for IP packets defined for many of these networks, but there is no standard for serial lines. SLIP, Serial Line IP, is a currently a de facto standard, commonly used for point-to-point serial connect...
متن کاملRIM: Router Interface Marking for IP Traceback
Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network paths the attack traffic traverses. This paper presents a novel IP traceback scheme called Router Interface Marking (RIM). In RIM, a router probabilistically marks packets with a router interface’s identifier. After collecti...
متن کاملSurvey on Packet Marking Algorithms for IP Traceback
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 2012
ISSN: 2636-4441
DOI: 10.21608/iceeng.2012.30647