Secure SDN Frameworkfor Data Exfiltration via Video Steganography

نویسنده

  • K. V Viswanatha
چکیده

The popularity of steganography in the data exfiltration of private corporate sensitive data is increased. So it is important to detect such malicious activity. Becausethe data being transferred can hide the large amount of data in video becoming increasingly attractive. To ensure privacy and security we proposed an effective steganalysis method to detect hidden data in video by using the SDN framework policy. The main objective of this paper is to prevent the illegal data transmission from the compromised private network by the malicious users. Index Terms Steganography, Data exfiltration, and Software defined network. Council for Innovative Research Peer Review Research Publishing System Journal: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Vol. 14, No. 9 www.ijctonline.com, [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Let SDN Be Your Eyes: Secure Forensics in Data Center Networks

Discovering the causes of incorrect behavior in large networks is often difficult. This difficulty is compounded when some machines in the network are compromised, since these compromised machines may use deception or tamper with data to frustrate forensic analysis. Recently proposed forensic tools enable administrators to learn the causes of some system states in a partially compromised networ...

متن کامل

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

Today’s internet applications require data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the solution for this problem is Steganography. That has to do with secure data transmission between a sender and a receiver; implementing Steganography is the best way. Steganography...

متن کامل

The Danger of Data Exfiltration over Social Media Sites

The pervasive utilization of social media sites within both the personal and commercial settings introduce new challenges to the information security sector. Modern network security platforms and procedures fall short in the detection and prevention of this emerging threat. Our research demonstrates new considerations network security professionals must consider when assessing and protecting in...

متن کامل

Review of Different Techniques of Image Steganography

Today, secure communication is the need of the society. Steganography and Cryptography are most popular techniques used for secure communication in the present era. Steganography is used hide the existence of data within some cover media like image file, audio file, video file, text file etc. But the most commonly used media for steganography is image file. There are many techniques of image st...

متن کامل

An Enhanced Least Significant Bit Steganography Technique

Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are becoming more relevant than earlier. This necessitates for a secure communication method to transmit messages via internet. Steganography is the science of communicating secret data in several multimedia carriers like audio, text, video or image. A modified technique to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015