The National Network-Centric System And Its Components In The Age Of Information Warfare
Price
Free (open access)
Transaction
Volume
108
Pages
9
Page Range
301 - 309
Published
2009
Size
867 kb
Paper DOI
10.2495/SAFE090291
Copyright
WIT Press
Author(s)
Z. Piotrowski
Abstract
This paper describes the new model of information warfare system based on a data hiding platform. This concept is based on the assumption that data hiding technology is the most effective mechanism for creating the new inter-layer, called the stego layer, in the known Internet Protocols. The main idea is to create network botnet bases on standard client-server architecture using specific agents – Hidden Protocol Interpreters (HPI). The HPIs are responsible for bidirectional hidden and secret communication with the administrator’s workstation. The HPI serves as a passive monitoring station of the Internet infrastructure, intercepts points for remote control commands and finally plays the role of an active element in order to take control of allocated IP mechanisms (computers, routers, etc.). In this paper, a likely new attack on telecommunications links called a voice spoofing attack, in the form of, for example, a subscriber’s voice impersonation, and a method of protection against this attack – Personal Trusted Terminal (PTT) – is also described. Keywords: NNS, voice spoofing attack, Hidden Protocol Interpreters (HPIs), steganographic router, Personal Trusted Terminal (PTT), stego botnet.
Keywords
NNS, voice spoofing attack, Hidden Protocol Interpreters (HPIs), steganographic router, Personal Trusted Terminal (PTT), stego botnet