TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR

TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR

Authors

  • Obid Mavlonov

Keywords:

Tarmoq steganografiyasi, Tarmoq protokollari, Saqlash kanallari, Vaqt kanallari, TCP/IP, IPv4, HTTP, Axborotni yashirish, Yashirin kanallar, OSI modeli.

Abstract

The article analyzes methods of hiding information using the capabilities of network protocols. Provides information on network steganography and how it is implemented over various channels, storage and time channels. Also, the article highlights the problems that arise in the implementation of steganography using network protocols, the development of steganographic tools and their advantages and disadvantages. It details how to create covert channels using the OSI model and various protocols, such as TCP/IP, IPv4, HTTP, and the technical and legal challenges they pose.

References

. Lubacz J., Mazurczyk W., Szczypiorski K. Principles and overview of network steganography //IEEE Communications Magazine. – 2014. – Т. 52. – №. 5. – С. 225-229.

. Smolarczyk M., Szczypiorski K., Pawluk J. Multilayer detection of network steganography //Electronics. – 2020. – Т. 9. – №. 12. – С. 2128.

. Ganiyev A. A., Allanov O. M., Mavlonov O. N. Tarmoq steganografiyasi usullarining tahlili: Analysis of Network Steganography Methods. – 2023.

. Kadhim J. M., Abed A. E. Steganography using TCP/IP's sequence number //Al-Nahrain Journal of Science. – 2017. – Т. 20. – №. 4. – С. 102-108.

. Zseby T. et al. A network steganography lab on detecting TCP/IP covert channels //IEEE Transactions on Education. – 2016. – Т. 59. – №. 3. – С. 224-232.

. CASTRO E. R. L. et al. Design of a steganographic system for hiding information in TCP/IP packets. – 2018.

Ganiyev, A. A., Mavlonov, O. N., Shodmonov, D. A., & Maxmudov, J. I. Kompyuter tarmoqlarida uzatilayotgan axborotni kriptografik himoyalash usuli. Международный Журнал Теоретических и Прикладных Вопросов Цифровых Технологий, (2024). 7(1), 73-79..

. Mavlonov O. N. HTTP PROTOKOLI SARLAVHASIDA AXBOROT BERKITISH ALGORITMI //RESEARCH AND EDUCATION. – 2023. – Т. 2. – №. 1. – С. 146-158.

. Liu Y. et al. A network-based CNN model to identify the hidden information in text data //Physica A: Statistical Mechanics and its Applications. – 2022. – Т. 590. – С. 126744.

. Eve M. P. Pynchon in Public Day 2011 //martineve. com. – 2011.

. Dimitrova B., Mileva A. Steganography of hypertext transfer protocol version 2 (http/2) //Journal of Computer and Communications. – 2017. – Т. 5. – С. 98-111.

. Hildebrand J., Saint-Andre P. Use of Entity Tags in XMPP Extensions. – 2005.

. Burgess C. et al. Detecting packed executables using steganalysis //2014 5th European Workshop on Visual Information Processing (EUVIP). – IEEE, 2014. – С. 1-5.

. Homer T. The Book Of Origins: The first of everything-from art to zoos. – Hachette UK, 2012.

Published

2024-10-20

How to Cite

Mavlonov, O. (2024). TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR: TARMOQ PROTOKOLLARIDA AXBOROTLARNI YASHIRISHDA YUZAGA KELADIGAN MUAMMOLAR. The Descendants of Al-Fargani, 1(3), 124–128. Retrieved from https://al-fargoniy.uz/index.php/journal/article/view/441

Issue

Section

Статьи

Categories