LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Performance Impact of Header-Based Network Steganographic Countermeasures

Photo by dulhiier from unsplash

Cybersecurity executives, engineers, and decision-makers should not presume effective network steganographic countermeasures come at the cost of performance. A performance assessment of network steganographic countermeasures during an experimental data exfiltration… Click to show full abstract

Cybersecurity executives, engineers, and decision-makers should not presume effective network steganographic countermeasures come at the cost of performance. A performance assessment of network steganographic countermeasures during an experimental data exfiltration attack revealed a negligible influence on latency. Despite the advanced nature of the attack, preventative controls did not degrade packet round-trip times to a statistically significant degree. During the experiment, synthetic credit card numbers were exfiltrated at a rate equivalent to (US) $\$ $ 74,702 per second. The measured round trip time between a covert transmitting host and covert receiving host was nearly identical regardless of whether interventions were active or inactive. The de minimis effect suggests similar preventative controls in an enterprise environment would not have an adverse effect on large volumes of business network traffic in the presence of an actual attack.

Keywords: network; steganographic countermeasures; impact header; performance impact; network steganographic

Journal Title: IEEE Access
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.