**6. Conclusion**

In this work, we began to develop methods and special software for generating bitstreams in order to organize a secure connection.

This software method was implemented in software, ensuring secure network communication. The main part of the program model is a detector program for analyzing network traffic to search for possible hidden transmissions. The analysis is implemented by checking the header in compliance with the standards, which is needed to identify unauthorized values for specific areas of the PDU.

The surveys revealed possible vulnerabilities that could embed relevant information in the puncture headers we reviewed. **Table 2** presents the quantification of the study results, showing the remainder is the number of bits that are part of the next 8 bits of the transmitted symbol.

It should be noted that TCP was created as a reliable protocol for delivery, but after entering the hidden data by the TCP header proposed above, changes made to the header fields of the TCP lead to the loss of the functionality of a reliable protocol, making it similar to the UDP.

In the created model, the transmission of one packet is realized, that is, the full message is embedded in all possible of headers at only one datagram. In order to see the maximum feasible messaging, we chose the following protocols: IPv4, IPv6, and TCP. Note that for simplicity, TCP header data is not included in the fragment offset. Thus, thanks to the proposed manipulation, the programming model uses 603 bits, which is 74.04% of the total number of bits in the order of three headers. This volume allows you to enter 75 characters out of 8 bits in ASCII encoding.


**85**

**Author details**

Anton Noskov

Yaroslavl State Technical University, Yaroslavl, Russia

provided the original work is properly cited.

\*Address all correspondence to: anton.noskov@gmail.com

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,

*Analysis of Network Protocols: The Ability of Concealing the Information*

*DOI: http://dx.doi.org/10.5772/intechopen.88098*

#### **Table 2.**

*The quantification of the study results.*

*Analysis of Network Protocols: The Ability of Concealing the Information DOI: http://dx.doi.org/10.5772/intechopen.88098*

*Computer and Network Security*

The size of the UDP header of the datagram is 64 bits; as a result of the described changes, you can use 32 bits, which is 50% of the total number of bits in the header,

In this work, we began to develop methods and special software for generating

This software method was implemented in software, ensuring secure network communication. The main part of the program model is a detector program for analyzing network traffic to search for possible hidden transmissions. The analysis is implemented by checking the header in compliance with the standards, which is

The surveys revealed possible vulnerabilities that could embed relevant information in the puncture headers we reviewed. **Table 2** presents the quantification of the study results, showing the remainder is the number of bits that are part of the

It should be noted that TCP was created as a reliable protocol for delivery, but after entering the hidden data by the TCP header proposed above, changes made to the header fields of the TCP lead to the loss of the functionality of a reliable proto-

In the created model, the transmission of one packet is realized, that is, the full message is embedded in all possible of headers at only one datagram. In order to see the maximum feasible messaging, we chose the following protocols: IPv4, IPv6, and TCP. Note that for simplicity, TCP header data is not included in the fragment offset. Thus, thanks to the proposed manipulation, the programming model uses 603 bits, which is 74.04% of the total number of bits in the order of three headers. This volume allows you to enter 75 characters out of 8 bits in ASCII encoding.

IPv4 (carrier) 182 56.88 22 6 IPv4 (passenger) 214 66 26 6 IPv6 (carrier) 156 48.75 19 4 IPv6 (passenger) 284 88.75 35 4 TCP 150 78.13 18 6 UDP 32 50 4 0

**Percentage of the total header size (%)**

**The number of symbols**

**Rest bits**

which allows you to implement a 4–8-bit header in the ASCII character set.

needed to identify unauthorized values for specific areas of the PDU.

bitstreams in order to organize a secure connection.

next 8 bits of the transmitted symbol.

**Protocol Size of injection** 

*The quantification of the study results.*

**information (bits)**

col, making it similar to the UDP.

**5. Result of injection**

**6. Conclusion**

**84**

**Table 2.**
