Privacy of encrypted voice-over-IP

被引:0
|
作者
Lella, Tuneesh [1 ]
Bettati, Riccardo [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple symbols show that the effectiveness to reconstruct the voice signal depends significantly on the quality of collected silence suppression information. We conclude by identifying a number of problems that need to be further studied in order to effectively assess the danger of silence suppression based attacks on VOIP systems.
引用
收藏
页码:3679 / 3684
页数:6
相关论文
共 50 条
  • [31] Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography
    Tian, Hui
    Jiang, Hong
    Zhou, Ke
    Feng, Dan
    COMPUTER JOURNAL, 2012, 55 (06): : 702 - 716
  • [32] Frame-bitrate-change based steganography for voice-over-IP
    刘进
    田晖
    周可
    JournalofCentralSouthUniversity, 2014, 21 (12) : 4544 - 4552
  • [33] Quality assessment and usage behavior of a mobile voice-over-IP service
    De Pessemier, Toon
    Stevens, Isabelle
    De Marez, Lieven
    Martens, Luc
    Joseph, Wout
    TELECOMMUNICATION SYSTEMS, 2016, 61 (03) : 417 - 432
  • [34] A High-Capacity Covering Code for Voice-Over-IP Steganography
    Tian, Hui
    Qin, Jie
    Huang, Yongfeng
    Wang, Xu An
    Liu, Jin
    Chen, Yonghong
    Wang, Tian
    Cai, Yiqiao
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2015, 10 (03) : 46 - 63
  • [35] Frame-bitrate-change based steganography for voice-over-IP
    Liu Jin
    Tian Hui
    Zhou Ke
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (12) : 4544 - 4552
  • [36] Accurate dimensioning of service level agreements in voice-over-IP networks
    Stewart, R
    Schormans, J
    JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 109 - 111
  • [37] Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
    Compagno, Alberto
    Conti, Mauro
    Lain, Daniele
    Tsudik, Gene
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 703 - 715
  • [38] Voice-over-IP security - State-of-the-art, risks, and concepts
    Eren, Evren
    Detken, Kai-Oliver
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2007, : 126 - +
  • [39] peerTalk: A peer-to-peer multiparty voice-over-IP system
    Gu, Xiaohui
    Wen, Zhen
    Yu, Philip S.
    Shae, Zon-Yin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (04) : 515 - 528
  • [40] Secure and efficient voice-over-IP in a cdma2000® network
    McCann, PJ
    Rance, R
    Patel, S
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (04): : 405 - 414