This article examines the possibilities of using the network layer packet headers of model OSI/ISO as steganography container. Describes the most common methods of ip - steganography. Proposed and describe a new method to network steganography - "method of options." The expediency of using the features of network layer model OSI/ISO as steganography container.
network steganography, steganography channel, steganography container