Patterns serve as a tool to determine whether new covert channel hiding techniques (or: 'hiding methods') do already exist: if there is already a pattern that describes a "new" hiding technique, it cannot be new. For this reason, patterns ease the novelty evaluation process of hiding techniques.
How to contribute an own pattern?
In case you invented a new hiding technique (new steganographic method/new covert channel) and think it is not represented by one of the patterns, please contact us for discussing the integration of your new pattern into the pattern catalog. Please also refer to Section 4.5 of [1] for a brief description of the process. We describe the integration of patterns into the traditional peer review process in detail in [2].
How to describe a new hiding technique (hiding method) or pattern?
We provide a comprehensive discussion of a description technique that covers all relevant aspects of a hiding technique in [3].
I want to discuss an existing pattern with the community. How can I initiate a discussion?
You can either contact us via email or you can use the `comment' function at the bottom of the pattern collection to publish your comments. Please note that the comments are moderated to prevent spam.
How can hiding patterns be integrated into the traditional peer review process?
Pattern can help to evaluate the novelty of hiding methods and can easily be integrated into the traditional peer review process. Therefore, the author of a paper describes his hiding method in form of a pattern and the reviewers verify whether the description is valid and whether the pattern is actually a new pattern or just a hiding method that can be represented by an existing pattern. We describe the integration of patterns into the traditional peer review process in [2]. Using a suitable description method that we show in [3] also helps to describe a new hiding technique.
References:
[1] S. Wendzel, S. Zander, B. Fechner, C. Herdin: Pattern-based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, Vol. 47, Issue 3, pp. 50:1-26, ACM, 2015.
An early version of the article is available here: download.
[2] S. Wendzel, C. Palmer: Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research, in: Journal of Universal Computer Science (J.UCS), Vol. 21, No. 12, pp. 1684-1705, 2015.
[3] S. Wendzel, W. Mazurczyk, S. Zander: Unified Description Method for Network Information Hiding Methods, in: Journal of Universal Computer Science (J.UCS), Vol. 22, No. 11, 2016.
Keine Kommentare:
Kommentar veröffentlichen