Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

New method for network anomaly detection

2011/01/D/ST7/05054

Keywords:

network security anomaly detection

Descriptors:

  • ST7_8: Communication networks

Panel:

ST7 - Systems and communication engineering: electronics, communication, optoelectronics

Host institution :

Politechnika Warszawska, Wydział Elektroniki i Technik Informacyjnych

woj. mazowieckie

Other projects carried out by the institution 

Principal investigator (from the host institution):

dr hab. Wojciech Mazurczyk 

Number of co-investigators in the project: 5

Call: SONATA 1 - announced on 2011-03-15

Amount awarded: 331 500 PLN

Project start date (Y-m-d): 2011-12-07

Project end date (Y-m-d): 2014-12-06

Project duration:: 36 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Publication in academic press/journals (13)
  • Articles in post-conference publications (6)
  1. Evaluation of Efficiency of Transcoding Steganography
    Authors:
    Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
    Academic press:
    Homeland Security & Emergency Management (rok: 2014, tom: 45600, strony: 555-578), Wydawca: De Gruyter
    Status:
    Published
    DOI:
    10.1515/jhsem-2014-0028 - link to the publication
  2. Multilevel Steganography: Improving Hidden Communication in Networks
    Authors:
    Wojciech Frączek, Wojciech Mazurczyk, Krzysztof Szczypiorski
    Academic press:
    Journal of Universal Computer Science (rok: 2012, tom: Vol. 18, No. 14, strony: 1967-1986), Wydawca: Inst. Information Systems Computer Media-IICM
    Status:
    Published
    DOI:
    10.3217/jucs-018-14-1967 - link to the publication
  3. Understanding BitTorrent Through Real Measurements
    Authors:
    Wojciech Mazurczyk, Paweł Kopiczko
    Academic press:
    China Communications (rok: 2013, tom: 45576, strony: 107-118), Wydawca: China Institute of Communications
    Status:
    Published
    DOI:
    10.1109/CC.2013.6674215 - link to the publication
  4. Advances in digital media security and right management
    Authors:
    W. Mazurczyk, K. Szczypiorski
    Academic press:
    Multimedia Systems (rok: 2014, tom: 20/2, strony: 101-103), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s00530-013-0339-8 - link to the publication
  5. On importance of steganographic cost for network steganography
    Authors:
    Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares,Krzysztof Szczypiorski
    Academic press:
    Security and Communication Networks (rok: 2014, tom: -, strony: -), Wydawca: Wiley
    Status:
    Accepted for publication
    DOI:
    10.1002/sec.1085 - link to the publication
  6. Influence of speech codecs selection on transcoding steganography
    Authors:
    Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
    Academic press:
    Telecommunication Systems Journal (rok: 2014, tom: Online first., strony: brak), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s11235-014-9937-9 - link to the publication
  7. Steganography in Modern Smartphones and Mitigation Techniques
    Authors:
    Luca Caviglione, Wojciech Mazurczyk
    Academic press:
    IEEE Communications Surveys & Tutorials (rok: 2014, tom: -, strony: 2014), Wydawca: IEEE ComSoc
    Status:
    Published
    DOI:
    10.1109/COMST.2014.2350994 - link to the publication
  8. SkyDe: a Skype-based Steganographic Method
    Authors:
    W. Mazurczyk, M. Karas, K. Szczypiorski
    Academic press:
    International Journal of Computers, Communications & Control (rok: 2013, tom: 8(3), strony: 432-443), Wydawca: Agora University
    Status:
    Published
  9. Steganalysis of transcoding steganography
    Authors:
    A. Janicki, W. Mazurczyk, K. Szczypiorski
    Academic press:
    Annals of Telecommunications (rok: 2014, tom: 69, strony: 449–460), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s12243-013-0385-4 - link to the publication
  10. VoIP Steganography and Its Detection - A Survey
    Authors:
    Wojciech Mazurczyk
    Academic press:
    ACM Computing Surveys (rok: 2014, tom: 46/2, strony: -), Wydawca: ACM
    Status:
    Published
    DOI:
    10.1145/2543581.2543587 - link to the publication
  11. Principles and Overview of Network Steganography
    Authors:
    Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski
    Academic press:
    IEEE Communications Magazine (rok: 2014, tom: 52/5, strony: 225-229), Wydawca: IEEE ComSoc
    Status:
    Published
    DOI:
    10.1109/MCOM.2014.6815916 - link to the publication
  12. Toward Effective and Reliable Digital Forensics
    Authors:
    Wojciech Mazurczyk, Krzysztof Szczypiorski
    Academic press:
    Computer Journal (rok: 2012, tom: Vol. 55, Iss. 6, strony: 651-652), Wydawca: Oxford University Press
    Status:
    Published
    DOI:
    10.1093/comjnl/bxs012 - link to the publication
  13. Using transcoding for hidden communication in IP telephony
    Authors:
    Wojciech Mazurczyk, Paweł Szaga, Krzysztof Szczypiorski
    Academic press:
    Multimedia Tools and Applications (rok: 2014, tom: 70/3, strony: 2139-2165), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s11042-012-1224-8 - link to the publication
  1. Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment
    Authors:
    Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Sczypiorski
    Conference:
    3rd International Workshop on Cyber Crime (IWCC 2014) co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014) (rok: 2014, ), Wydawca: IEEE ComSoc
    Data:
    konferencja 18 maja 2014
    Status:
    Published
  2. Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks
    Authors:
    Szymon Grabski, Krzysztof Szczypiorski
    Conference:
    5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (rok: 2013, ), Wydawca: IEEE ComSoc
    Data:
    konferencja 10-13.09.2013
    Status:
    Published
  3. Steganography in WiMAX networks
    Authors:
    Iwona Grabska, Krzysztof Szczypiorski
    Conference:
    5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (rok: 2013, ), Wydawca: IEEE ComSoc
    Data:
    konferencja 10-13.09.2013
    Status:
    Published
  4. StegTorrent: a Steganographic Method for the P2P File Sharing Service
    Authors:
    P. Kopiczko, W. Mazurczyk, K. Szczypiorski
    Conference:
    2nd International Workshop on Cyber Crime (IWCC 2013) co-located with the 34th IEEE Symposium on Security and Privacy (IEEE S&P 2013) (rok: 2013, ), Wydawca: IEEE ComSoc
    Data:
    konferencja 24.05.2013
    Status:
    Published
  5. Steganography in Long Term Evolution Systems
    Authors:
    Iwona Grabska, Krzysztof Szczypiorski
    Conference:
    3rd International Workshop on Cyber Crime (IWCC 2014) co-located with the 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014) (rok: 2014, ), Wydawca: IEEE ComSoc
    Data:
    konferencja 18 maja 2014
    Status:
    Published
  6. Towards Steganography Detection Through Network Traffic Visualisation
    Authors:
    W. Mazurczyk, K. Szczypiorski, B. Jankowski
    Conference:
    International Congress on Ultra Modern Telecommunications and Control Systems (ICUMT 2012) (rok: 2012, ), Wydawca: IEEE Xplore
    Data:
    konferencja 3-5.10.2012
    Status:
    Published