2007 IEEE International Conference on Systems, Man and Cybernetics 2007
DOI: 10.1109/icsmc.2007.4414198
|View full text |Cite
|
Sign up to set email alerts
|

Privacy of encrypted voice-over-IP

Abstract: In this paper, we present an early study on how timing-based traffic analysis attacks can be used to reconstruct the communication on end-to-end VOIP systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We describe a simple Bayesian classifier to identify simple voice signals from the pattern of packet timings. We then proceed to incorporate context awareness by using a Hidden Markov model. Experiments with very simple s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Furthermore, by using the DTW algorithm, the drawbacks of an approach involving HMMs, e.g., an extensive amount of training data, can be avoided. Also, the capacity of DTW to deal with time or speed variability along with the use of packet sizes as discriminant features renders the proposed approach stronger than the one described in [4]. Finally, because Skype is closed source and its audio codec is not widely published, the approach proposed in [5] and [6] could not have been applied.…”
Section: Discussionmentioning
confidence: 96%
See 2 more Smart Citations
“…Furthermore, by using the DTW algorithm, the drawbacks of an approach involving HMMs, e.g., an extensive amount of training data, can be avoided. Also, the capacity of DTW to deal with time or speed variability along with the use of packet sizes as discriminant features renders the proposed approach stronger than the one described in [4]. Finally, because Skype is closed source and its audio codec is not widely published, the approach proposed in [5] and [6] could not have been applied.…”
Section: Discussionmentioning
confidence: 96%
“…The efficiency of the approach presented in [4] is strongly dependent on the quality of the network. Furthermore, sentences of similar lengths cannot be reliably identified.…”
Section: B Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The efficiency of the approach presented in [10] is strongly dependent on the quality of the network. Furthermore, sentences of similar lengths cannot be reliably identified.…”
Section: Motivationmentioning
confidence: 99%
“…In their paper Privacy of Encrypted Voice over IP that focuses on Google Talk, Lella and Bettati [10] assume that the packet sizes do not carry any information but that all the information is contained in the inter-arrival times. They use the silence phases, which are encoded in smaller packets and with bigger inter-arrival times, to isolate words.…”
Section: Related Workmentioning
confidence: 99%