MASHINALI O‘QITISHDAN FOYDALANIB STEGANOGRAFIK USULLAR ORQALI YASHIRINGAN MA’LUMOTLARNI ANIQLASH METODLARI

Authors

  • Boburbek Abduvaxob o‘g‘li Odiljonov Muhammad al-Alxorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, magistrant
  • Zarif Xudoyqulov Muhammad al-Alxorazmiy nomidagi Toshkent axborot texnologiyalari universiteti, PhD, dotsent

Keywords:

Tarmoq steganografiyasi, TCP/IP sarlavha maydoni, stegopaketlar, steganaliz, mashinani o‘rganish, Tasodifiy o‘rmon.

Abstract

Ushbu maqola TCP va IP tarmoq protokollari sarlavhalari maydonlarida yashiringan maxfiy ma’lumotlarni aniqlash modeli taqdim etildi. Steganografiyani aniqlash uchun ishlatiladigan an’anaviy vositalar va usullar ste-ganografik paketlarning belgilarini aniqlash qiyin. Shu sababli, tadqiqotda steganografik paketlarning g‘ayritabiiy xatti-harakatlarini aniqlash uchun bir nechta mashinani o‘rganish usullari tajribadan o‘tkazildi. Modellarning imkoniyatlarini baholash uchun to‘g‘ri aniqlangan natijalar soni va ularning umumiy soni o‘rtasidagi bog‘liqlik formulasidan foydalaniladi.

 

References

B. Xu, J. Z. Wang, and D. Y. Peng, “Practical Protocol Steganography: Hiding Data in IP Header,” Proceedings - 1st Asia International Conference on Modelling and Simulation: Asia Modelling Symposium 2007, AMS 2007, pp. 584–588, 2007, doi: 10.1109/AMS.2007.80.

K. Szczypiorski, “A performance analysis of HICCUPS - A steganographic system for WLAN,” 1st International Conference on Multimedia Information Networking and Security, MINES 2009, vol. 1, pp. 569–572, 2009, doi: 10.1109/MINES.2009.248.

A. S. Nair, A. Sur, and S. Nandi, “Detection of packet length-based network steganography,” Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, pp. 574–578, 2010, doi: 10.1109/MINES.2010.126.

C. H. Rowland, “Covert Channels in the TCP/IP Protocol Suite,” undefined, vol. 2, no. 5, 1997, doi: 10.5210/FM. V2I5.528.

S. Cabuk, C. E. Brodley, and C. Shields, “IP Covert Channel Detection,” undefined, vol. 12, no. 4, Apr. 2009, doi: 10.1145/1513601.1513604.

A. Noskov and F. Jakab, “Analysis of network protocols the ability of concealing the information,” ICETA 2016 - 14th IEEE International Conference on Emerging eLearning Technologies and Applications, Proceedings, pp. 245–249, Dec. 2016, doi: 10.1109/ICETA.2016.7802098.

D. X. Cho, D. T. H. Thuong, and N. K. Dung, “A Method of Detecting Storage Based Network Steganography Using Machine Learning,” Procedia Comput Sci, vol. 154, pp. 543–548, 2018, doi: 10.1016/J.PROCS.2019.06.086.

Downloads

Published

2023-04-16

How to Cite

Odiljonov, B. A. o‘g‘li, & Xudoyqulov, Z. (2023). MASHINALI O‘QITISHDAN FOYDALANIB STEGANOGRAFIK USULLAR ORQALI YASHIRINGAN MA’LUMOTLARNI ANIQLASH METODLARI. Innovative Development in Educational Activities, 2(7), 749–757. Retrieved from https://openidea.uz/index.php/idea/article/view/1112