Abstract [eng] |
Steganographic methods are means to hiding data inside various carriers. Network protocols are such carriers. TCP/IP model encompasses all network protocols, many of them can be used to create covert channels which transmit the secret data. The covert channels are created by modifying protocol specific fields, timing features or both. In this paper, HTTP/2, an application layer protocol, is used to create a covert channel by modifying its frame fields. One of the most prominent steganalysis methods for detecting messages hidden using steganography is calculation of Shannon’s entropy, in this paper, its effectiveness is measured against HTTP/2 stream. The source code of HTTP/2 steganographic method is also provided at the end of the paper to act as a demonstration. |