METHODS OF HIDING DATA IN COMPUTER NETWORKS: FROM CLASSICS TO IoT AND Ai

Authors

DOI:

https://doi.org/10.31891/csit-2025-4-3

Keywords:

network steganography, covert channels, IoT, transmission protocols, cybersecurity, steganalysis, information security

Abstract

The article presents an overview of key methods in network steganography, including the classification of data hiding techniques in network protocols and discussion of promising directions for further research. Special attention is paid to the use of steganography in modern network environments such as IoT, as well as the application of artificial intelligence to traffic masking. The paper also outlines current approaches to hidden channel detection and threat modeling in digital communication systems.

Downloads

Published

2025-12-30

How to Cite

SHELEST, M., PIDLISNYI, Y., & KAPUSTIAN, M. (2025). METHODS OF HIDING DATA IN COMPUTER NETWORKS: FROM CLASSICS TO IoT AND Ai. Computer Systems and Information Technologies, (4), 27–34. https://doi.org/10.31891/csit-2025-4-3