Share Email Print

Proceedings Paper

The idea of hidden data layer in software defined network
Author(s): Zbigniew Piotrowski; Przemysław Ścibiorek
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

There are more and more steganographic techniques used in IP networks. Modification of packet headers of different protocols, frame bit-breaking or delay-packet delay control is just a few examples used in network steganography. Technological development determines the emergence of new, more advanced methods of secretive transmission. The increase in the popularity of the Software Defined Network (SDN) creates the opportunity to develop a completely new, robust against attacks and transparent for traffic analyzers, the way of traffic management based on hidden communication channels. This article contains a proposal for a Hidden Data Layer (HDL) mechanism in SDN networks. The concept consists in introducing the so-called Head Resident (HR), who oversees the operation of the traditional SDN controller. Terminal devices equipped with Hidden Protocol Interpreters (HPIs), after prior authorization by HR, transmit important data via a hidden data channel. HR will collect and record data sent through a hidden data channel, and if it detects an anomaly in the network operation, it responds appropriately (e.g. by disconnecting a network device or taking control over the operation of the entire network). Such architecture allows you to transmit sensitive data in a universally available network in multi-domain architecture in a robust and reliable way.

Paper Details

Date Published: 27 March 2019
PDF: 6 pages
Proc. SPIE 11055, XII Conference on Reconnaissance and Electronic Warfare Systems, 110551I (27 March 2019); doi: 10.1117/12.2525126
Show Author Affiliations
Zbigniew Piotrowski, Military Univ. of Technology (Poland)
Przemysław Ścibiorek, Military Univ. of Technology (Poland)

Published in SPIE Proceedings Vol. 11055:
XII Conference on Reconnaissance and Electronic Warfare Systems
Piotr Kaniewski, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?