Privacy of encrypted voice-over-IP

被引:0
|
作者
Lella, Tuneesh [1 ]
Bettati, Riccardo [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple symbols show that the effectiveness to reconstruct the voice signal depends significantly on the quality of collected silence suppression information. We conclude by identifying a number of problems that need to be further studied in order to effectively assess the danger of silence suppression based attacks on VOIP systems.
引用
收藏
页码:3679 / 3684
页数:6
相关论文
共 50 条
  • [21] Adaptive Speech Quality Management in Voice-over-IP Communications
    Myakotnykh, Eugene S.
    Thompson, Richard A.
    AICT: 2009 FIFTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, 2009, : 64 - 71
  • [22] Computational Quality Model for Wideband Voice-over-IP Communications
    Myakotnykh, Eugene S.
    Thompson, Richard A.
    CQR: 2009 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE AND COMMUNICATIONS QUALITY AND RELIABILITY, 2009, : 13 - +
  • [23] Absorptlydine: Typical unification of voice-over-ip and the lookaside buffer
    Wei, L
    Proceedings of the 11th Joint International Computer Conference, 2005, : 11 - 15
  • [24] SDRS: A Voice-over-IP Spam Detection and Reaction System
    Mathieu, Bertrand
    Niccolini, Saverio
    Sisalem, Dorgham
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 52 - 59
  • [25] Analysis of the quality of experience of a commercial voice-over-IP service
    De Pessemier, Toon
    Stevens, Isabelle
    De Marez, Lieven
    Martens, Luc
    Joseph, Wout
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) : 5873 - 5895
  • [26] Voice-over-IP for corporate users - A solution in search of a problem?
    van Tricht, E
    Quist, C
    BRITISH TELECOMMUNICATIONS ENGINEERING, 1999, 18 : 9 - 14
  • [27] Analysis of the quality of experience of a commercial voice-over-IP service
    Toon De Pessemier
    Isabelle Stevens
    Lieven De Marez
    Luc Martens
    Wout Joseph
    Multimedia Tools and Applications, 2015, 74 : 5873 - 5895
  • [28] Dynamic matrix encoding strategy for voice-over-IP steganography
    Tian Hui
    Zhou Ke
    Feng Dan
    JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2010, 17 (06): : 1285 - 1292
  • [29] Dynamic matrix encoding strategy for voice-over-IP steganography
    Hui Tian
    Ke Zhou
    Dan Feng
    Journal of Central South University of Technology, 2010, 17 : 1285 - 1292
  • [30] Applying scheduling policies to improve QoE in wireless Voice-over-IP
    Lambrinos, Lambros
    Djouvas, Constantinos
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 366 - 370