Featured in

Anomaly detection

Title: Towards model-based anomaly detection in network communication protocols
Author: Jędrzej Bieniasz, B.Sc., Piotr Sapiecha, Ph.D., Miłosz Smolarczyk M.Sc., Prof. Krzysztof Szczypiorski
Date: August 5, 2016
Keywords: Network Protocols, Protocol Model Inference, Model-based Verification and Validation, Model-based Testing, Anomaly Detection, Protocol Reverse Engineering

Abstract: Over the last few years many techniques have been applied to find and mitigate vulnerabilities, misuses, cyber-attacks and other cyber-security flaws. One of the approaches, which we consider in this paper, is a model-based technique applied to network communication protocols. This idea is not brand new, and model-based techniques have been successfully used to verify and validate the standard models of communication protocols. However, the implementation of network protocols varies from one system to another, and in many cases they miss standards or recommendations. Attackers know these flaws very often and try to use them before everybody else finds them, what can be called “zero-day exploit of communication protocol.” To address this issue, a combination of the best features of model-based and anomaly detection techniques could be applied. (...)

Steganography in open social networks

Title: StegHash: New Method for Information Hiding in Open Social Networks
Author: Prof. Krzysztof Szczypiorski
Date: November 2, 2016
Keywords: information hiding, open social networks, hashtag, StegHash

Abstract: In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.

Steganography in club music

Title: StegIbiza: New Method for Information Hiding in Club Music
Author: Prof. Krzysztof Szczypiorski
Date: August 10, 2016
Keywords: information hiding, audio steganography, musical steganography, club music, StegIbiza

Abstract: In this paper a new method for information hiding in club music is introduced. The method called StegIbiza is based on using the music tempo as a carrier. The tempo is modulated by hidden messages with a 3-value coding scheme, which is an adoption of Morse code for StegIbiza. The evaluation of the system was performed for several music samples (with and without StegIbiza enabled) on a selected group of testers who had a music background. Finally, for the worst case scenario, none of them could identify any differences in the audio with a 1% margin of changed tempo.