DocumentCode :
2550230
Title :
Privacy of encrypted voice-over-IP
Author :
Leila, T. ; Bettati, Riccardo
Author_Institution :
Texas A&M Univ., College Station
fYear :
2007
fDate :
7-10 Oct. 2007
Firstpage :
3063
Lastpage :
3068
Abstract :
In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple symbols show that the effectiveness to reconstruct the voice signal depends significantly on the quality of collected silence suppression information. We conclude by identifying a number of problems that need to be further studied in order to effectively assess the danger of silence suppression based attacks on VOIP systems.
Keywords :
Bayes methods; Internet telephony; cryptography; signal reconstruction; telecommunication traffic; Bayesian classifier; encrypted voice-over-IP; end-to-end VOIP systems; hidden Markov model; packet timings; silence suppression information; timing-based traffic analysis attacks; voice inactivity period; voice signal reconstruction; voice signals; Bayesian methods; Context awareness; Cryptography; Hidden Markov models; Internet telephony; Privacy; Signal processing; Speech analysis; Timing; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man and Cybernetics, 2007. ISIC. IEEE International Conference on
Conference_Location :
Montreal, Que.
Print_ISBN :
978-1-4244-0990-7
Electronic_ISBN :
978-1-4244-0991-4
Type :
conf
DOI :
10.1109/ICSMC.2007.4414198
Filename :
4414198
Link To Document :
بازگشت