A framework for avoiding steganography usage over HTTP

  • Authors:
  • Jorge Blasco;Julio Cesar Hernandez-Castro;José María de Fuentes;Benjamín Ramos

  • Affiliations:
  • Computer Science Department, Carlos III University of Madrid, Av. de la Universidad 30, 28911 Leganés, Spain;School of Computing, University of Portsmouth, Buckingham Building, Lion Terrace, Portsmouth PO1 3HE, UK;Computer Science Department, Carlos III University of Madrid, Av. de la Universidad 30, 28911 Leganés, Spain;Computer Science Department, Carlos III University of Madrid, Av. de la Universidad 30, 28911 Leganés, Spain

  • Venue:
  • Journal of Network and Computer Applications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.