Privacy of encrypted voice-over-IP

被引:0
|
作者
Lella, Tuneesh [1 ]
Bettati, Riccardo [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple symbols show that the effectiveness to reconstruct the voice signal depends significantly on the quality of collected silence suppression information. We conclude by identifying a number of problems that need to be further studied in order to effectively assess the danger of silence suppression based attacks on VOIP systems.
引用
收藏
页码:3679 / 3684
页数:6
相关论文
共 50 条
  • [1] Voice-over-IP
    不详
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (1-2): : A11 - A11
  • [2] Secure Voice-over-IP
    Dunte, Markus
    Ruland, Christoph
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (06): : 63 - 68
  • [3] Voice-over-IP matchmakers
    Telephony, 1998, 235 (18):
  • [4] On the Study of Voice-over-IP
    Li, Jinci
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, 2012, 1479 : 886 - 889
  • [5] Quality of service & voice-over-IP
    Räisänen, V
    DR DOBBS JOURNAL, 2001, 26 (05): : 50 - +
  • [6] Quality of service and voice-over-IP
    Raisanen, V.
    Dr. Dobb's Journal, 2001, 26 (05):
  • [7] Challenges for mobile Voice-over-IP
    Agrawal, P
    Chen, JC
    Sreenan, CJ
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2000, 1818 : 58 - 69
  • [8] QoS requirements for a voice-over-IP PSTN
    Hunt, G
    Arden, P
    BT TECHNOLOGY JOURNAL, 2005, 23 (02) : 37 - 47
  • [9] Voice-over-IP谁领风骚
    李梦晓
    每周电脑报, 1998, (16) : 95 - 95
  • [10] Design and evaluation of steganography for Voice-over-IP
    Kraetzer, Christian
    Dittmann, Jana
    Vogel, Thomas
    Hillert, Reyk
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 2397 - +