Privacy of encrypted voice-over-IP

被引:0
|
作者
Lella, Tuneesh [1 ]
Bettati, Riccardo [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple symbols show that the effectiveness to reconstruct the voice signal depends significantly on the quality of collected silence suppression information. We conclude by identifying a number of problems that need to be further studied in order to effectively assess the danger of silence suppression based attacks on VOIP systems.
引用
收藏
页码:3679 / 3684
页数:6
相关论文
共 50 条
  • [41] Signal processor simplifies today's voice-over-IP systems
    Bursky, D
    ELECTRONIC DESIGN, 2000, 48 (18) : 100 - +
  • [42] Performance and Capacity of Cellular OFDMA Systems With Voice-Over-IP Traffic
    Bi, Qi
    Vitebsky, Stan
    Yang, Yang
    Yuan, Yifei
    Zhang, Qinqing
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (06) : 3641 - 3652
  • [43] Quality assessment and usage behavior of a mobile voice-over-IP service
    Toon De Pessemier
    Isabelle Stevens
    Lieven De Marez
    Luc Martens
    Wout Joseph
    Telecommunication Systems, 2016, 61 : 417 - 432
  • [44] Capacity planning strategies for voice-over-IP traffic in the core network
    Van Hoey, G
    Van den Bosch, S
    de la Vallée-Poussin, P
    De Neve, H
    Petit, G
    2001 IEEE WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2001, : 109 - 112
  • [45] Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test
    Liu, Jie
    Tian, Hui
    Chang, Chin-Chen
    Wang, Tian
    Chen, Yonghong
    Cai, Yiqiao
    SYMMETRY-BASEL, 2018, 10 (08):
  • [46] Voice-over-IP performance in UTRA Long Term Evolution Downlink
    Puttonen, Jani
    Henttonen, Tero
    Kolehmainen, Niko
    Aschan, Kennett
    Moisio, Martti
    Kela, Petteri
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 2502 - +
  • [47] Frame-bitrate-change based steganography for voice-over-IP
    Jin Liu
    Hui Tian
    Ke Zhou
    Journal of Central South University, 2014, 21 : 4544 - 4552
  • [48] An Enhanced Steganographic Code and Its Application in Voice-Over-IP Steganography
    Zhang, Lejun
    Hu, Xiaoyan
    Rasheed, Waqas
    Huang, Tianwen
    Zhao, Chunhui
    IEEE ACCESS, 2019, 7 (97187-97195) : 97187 - 97195
  • [49] Adaptive voice-over-IP steganography based on quantitative performance ranking
    Tian H.
    Guo S.-T.
    Qin J.
    Huang Y.-F.
    Chen Y.-H.
    Lu J.
    1600, Chinese Institute of Electronics (44): : 2735 - 2741
  • [50] Transparency-orientated encoding strategies for voice-over-IP steganography
    Tian, H. (htian@hqu.edu.cn), 1600, Oxford University Press (55):