Software Defined Network Based Forensic System ForConcealed Communication Detection

Shantala C.P*, K.V Viswanatha**
* Research Scholar, C.M.R University, Bangalore, Karnataka, India
** Dean, PG Studies, C.M.R University, Bangalore, Karnataka, India.
Periodicity:October - December'2014
DOI : https://doi.org/10.26634/jse.9.2.3324

Abstract

The popularity of steganography has Increased in private network due to data exfllfrafion of corporate sensitive data and If Is Important to detect such malicious activity. In vi'deo a large amount of data can be hidden which is becoming Increasingly a concern of Interest . If Is very hard to defect the Inside affacker in the organization network who can extract the sensitive Information from organization and fransfer that information In hidden format through the video sfeganography To ensure privacy and security the authors have proposed an effective sfeganalysis method to defect hidden data in video by using the SDN framework pollcy. With the help of the SDN framework administrator of private network can look at the whole network and control the network by programming The main objective of this paper Is to prevent the illegal data transmission from the compromised private network by the mallclous users. Keywords: Steganography, Data Exfiltration, and Software Defined Network.

Keywords

Steganography, Data Exfiltration and Software Defined Network.

How to Cite this Article?

Shantala.C.P., and Viswanatha.K.V.(2014). Software Defined Network Based Forensic System For Concealed Communication Detection. i-manager’s Journal on Software Engineering,9(2), 17-23. https://doi.org/10.26634/jse.9.2.3324

References

[1] . Iftach Ian Amit , (201 I ) . “Advanced Data Exfiltration-the wayQ would have done It", September.
[2]. http://www.tripwire,com/state-of-security/incidenf- detection/hackers-exfiltrating-data-with-video-steganography-via-cloud- video-services.
[3]. Shantala C P. K V Viswanatha, (2013). "Different Steganography Methods and Performance Analysis", International Journal of Engineering Inventions, ISSN: 2278- 7461 , ISBN: 2319-6491 , Volume 2, Issue 1(January) PP: 37-45.
[4]. Natarajan Meghanathan and Lopamudra Nayak, (2010). "Steganalysis algorithms for detecting the hidden information in image, audio and video cover media”, International Journal of Network Security & Its Application (IJNSA), Vol. 2, No. 1 , January.
[5]. https://www.youtube.com/
[6]. ShridarKNRao,"SDN and itsUseCase-NVandNFV" NTIL2OI4.
[7]. https://www.sdxcentral.com/resources/sdn/sdn- controllers/sdn-controllers-comprehensive-list/
[8]. WojciechMazurczyk, PawetSzaga, Krzysztof Szczypiorski, (2014). "Using Transcoding for Hidden Communication in IP Telephony", Multimedia Tools and Applications, June, Vol. 7O(3), pp. 2 I 39-21 65 .
[9]. Sadoon Hussein Abdullah, (2009). "Steganography Methods and some application", (The hidden Secret Data in Image), April.
[10]. Jayaram P, Ranganatha H R, Anupama H S, (2011). "Information Hiding Using Audio Steganography - A Survey", The International Journal of Multimedia & its Applications(IJMA),Vol. 3, No. 3, August.
[11]. Monika Agarwal, (2013). "Text Steganographic Approaches: A Comparison", International Journal of Network Security & its Applications (IJNSA), VoL5, No. 1 , January
[12]. Sandra Scott-Hayward, Gemma O'Callaghan and SakirSezer, "SDN Security: A Survey”.
[13]. Wolfgang Braun and Michael Menth, (2014). "Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices," May.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.