METHODS OF HIDING DATA IN COMPUTER NETWORKS: FROM CLASSICS TO IoT AND Ai
DOI:
https://doi.org/10.31891/csit-2025-4-3Keywords:
network steganography, covert channels, IoT, transmission protocols, cybersecurity, steganalysis, information securityAbstract
The article presents an overview of key methods in network steganography, including the classification of data hiding techniques in network protocols and discussion of promising directions for further research. Special attention is paid to the use of steganography in modern network environments such as IoT, as well as the application of artificial intelligence to traffic masking. The paper also outlines current approaches to hidden channel detection and threat modeling in digital communication systems.
Downloads
Published
2025-12-30
How to Cite
SHELEST, M., PIDLISNYI, Y., & KAPUSTIAN, M. (2025). METHODS OF HIDING DATA IN COMPUTER NETWORKS: FROM CLASSICS TO IoT AND Ai. Computer Systems and Information Technologies, (4), 27–34. https://doi.org/10.31891/csit-2025-4-3
Issue
Section
Articles
License
Copyright (c) 2026 Mariia Kapustian

This work is licensed under a Creative Commons Attribution 4.0 International License.