TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR
TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR
Keywords:
Tarmoq steganografiyasi, Tarmoq protokollari, Saqlash kanallari, Vaqt kanallari, TCP/IP, IPv4, HTTP, Axborotni yashirish, Yashirin kanallar, OSI modeli.Abstract
The article analyzes methods of hiding information using the capabilities of network protocols. Provides information on network steganography and how it is implemented over various channels, storage and time channels. Also, the article highlights the problems that arise in the implementation of steganography using network protocols, the development of steganographic tools and their advantages and disadvantages. It details how to create covert channels using the OSI model and various protocols, such as TCP/IP, IPv4, HTTP, and the technical and legal challenges they pose.
References
. Lubacz J., Mazurczyk W., Szczypiorski K. Principles and overview of network steganography //IEEE Communications Magazine. – 2014. – Т. 52. – №. 5. – С. 225-229.
. Smolarczyk M., Szczypiorski K., Pawluk J. Multilayer detection of network steganography //Electronics. – 2020. – Т. 9. – №. 12. – С. 2128.
. Ganiyev A. A., Allanov O. M., Mavlonov O. N. Tarmoq steganografiyasi usullarining tahlili: Analysis of Network Steganography Methods. – 2023.
. Kadhim J. M., Abed A. E. Steganography using TCP/IP's sequence number //Al-Nahrain Journal of Science. – 2017. – Т. 20. – №. 4. – С. 102-108.
. Zseby T. et al. A network steganography lab on detecting TCP/IP covert channels //IEEE Transactions on Education. – 2016. – Т. 59. – №. 3. – С. 224-232.
. CASTRO E. R. L. et al. Design of a steganographic system for hiding information in TCP/IP packets. – 2018.
Ganiyev, A. A., Mavlonov, O. N., Shodmonov, D. A., & Maxmudov, J. I. Kompyuter tarmoqlarida uzatilayotgan axborotni kriptografik himoyalash usuli. Международный Журнал Теоретических и Прикладных Вопросов Цифровых Технологий, (2024). 7(1), 73-79..
. Mavlonov O. N. HTTP PROTOKOLI SARLAVHASIDA AXBOROT BERKITISH ALGORITMI //RESEARCH AND EDUCATION. – 2023. – Т. 2. – №. 1. – С. 146-158.
. Liu Y. et al. A network-based CNN model to identify the hidden information in text data //Physica A: Statistical Mechanics and its Applications. – 2022. – Т. 590. – С. 126744.
. Eve M. P. Pynchon in Public Day 2011 //martineve. com. – 2011.
. Dimitrova B., Mileva A. Steganography of hypertext transfer protocol version 2 (http/2) //Journal of Computer and Communications. – 2017. – Т. 5. – С. 98-111.
. Hildebrand J., Saint-Andre P. Use of Entity Tags in XMPP Extensions. – 2005.
. Burgess C. et al. Detecting packed executables using steganalysis //2014 5th European Workshop on Visual Information Processing (EUVIP). – IEEE, 2014. – С. 1-5.
. Homer T. The Book Of Origins: The first of everything-from art to zoos. – Hachette UK, 2012.
Additional Files
Published
How to Cite
License
Copyright (c) 2024 Obid Mavlonov

This work is licensed under a Creative Commons Attribution 4.0 International License.