Sending Hidden Data via Google Suggest

نویسندگان

  • Piotr Bialczak
  • Wojciech Mazurczyk
  • Krzysztof Szczypiorski
چکیده

Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method’s idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

The hidden terminal is classified as the sending hidden terminal and receiving hidden terminal in this paper. The quantitive analysis of hidden terminal problem and simulation-based analysis of its mechanism is discussed. Through the extensive ns2 simulations the detail comparison for the impact of sending hidden terminal and receiving hidden terminal to the performance of TCP is also given. Th...

متن کامل

Context-aware Search for Personal Information Management Systems

With the fast growth of disk capacity in personal computers, keyword search over personal data (a.k.a. desktop search) is becoming increasingly important. Nonetheless, desktop search has been shown to be more challenging than traditional Web search. Modern commercial Web search engines heavily rely on structural information (i.e., hyperlinks betweenWeb pages) to rank their search results. Howev...

متن کامل

Exploiting a GSM Network for Precise Payload Delivery

This paper introduces the novel concept of using a GSM network for command of and communications with multiple aerial delivery systems. The research prototype of such a system, Snowflake-N, allows communicating with other network clients via a commercial Blackberry Curve 8310 handheld over a Bluetooth connection. A new architecture allows reassigning targets and sending other relevant commands ...

متن کامل

Brandt's GLR method & refined HMM segmentation for TTS synthesis application

In comparison with standard HMM (Hidden Markov Model) with forced alignment, this paper discusses two automatic segmentation algorithms from different points of view: the probabilities of insertion and omission, and the accuracy. The first algorithm, hereafter named the refined HMM algorithm, aims at refining the segmentation performed by standard HMM via a GMM (Gaussian Mixture Model) of each ...

متن کامل

Tracking Malware using Internet Activity Data

Forensic Investigation into security incidents often includes the examination of huge lists of internet activity gathered from a suspect computer. In today’s age of increased internet usage, the internet activity log on any given system could produce a huge list of websites. This, couples with the fact that a huge percentage of malware is now distributed via the internet, often through compromi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1107.4062  شماره 

صفحات  -

تاریخ انتشار 2011