| DC Field | Value | Language |
| dc.contributor.author | Duong Ngoc Anti | - |
| dc.contributor.author | Dao Thanh Huong | - |
| dc.coverage.spatial | Минск | en_US |
| dc.date.accessioned | 2026-04-29T08:06:14Z | - |
| dc.date.available | 2026-04-29T08:06:14Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.citation | Duong Ngoc Anti. Detecting cyber-attacks based on network steganography / Duong Ngoc Anti, Dao Thanh Huong // Технические средства защиты информации : материалы ХXIV Международной научно-технической конференции, Минск, 8 апреля 2026 года / Белорусский государственный университет информатики и радиоэлектроники [и др.] ; редкол.: О. В. Бойправ [и др.]. – Минск, 2026. – С. 232–236. | en_US |
| dc.identifier.uri | https://libeldoc.bsuir.by/handle/123456789/63475 | - |
| dc.description.abstract | With the rapid development of information technology and the growing number of network attacks, ensuring the security of computer networks is particularly important. One of the covert methods of data transmission is network steganography, which allows information to be embedded in legitimate network traffic. Such approaches are used by attackers to control malware, establish covert communication channels, and leak confidential data. This paper examines the main attack methods based on network steganography and analyzes modern approaches to their detection. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | БГУИР | en_US |
| dc.subject | материалы конференций | en_US |
| dc.subject | network steganography | en_US |
| dc.subject | covert channel detection | en_US |
| dc.subject | steganalysis | en_US |
| dc.subject | information hiding | en_US |
| dc.subject | machine learning | en_US |
| dc.subject | deep learning | en_US |
| dc.subject | multilayer hybrid detection | en_US |
| dc.subject | Zero Trust | en_US |
| dc.title | Detecting cyber-attacks based on network steganography | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | ТСЗИ 2026
|