Voice pattern hiding for VoIP communications

  • Jialue Fang
  • , Ye Zhu
  • , Yong Guan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In this paper, we address issues related to traffic analysis attacks and the corresponding countermeasures in Voice over IP (VoIP) traffic. VoIP is widely used in today's communication, it converts analog voice signals into digital data packets and supports real-time, two-way transmission of conversations using Internet Protocol. We focus on a particular class of traffic analysis attack, timing-based correlation attacks, by which an adversary attempt to analyze packet inter-arrival time of a user and correlate the output traffic with the traffic in their database. Correlation method that is used in this type of attack, namely Dynamic Time Warping(DTW) based Correlation. Based on our threat model and known strategies in existing VoIP communication, we develop methods that can effectively counter the timing-based correlation attacks. The empirical results provided showed the effectiveness of the proposed scheme in term of countering timing-based correlation attacks.
Original languageEnglish
Title of host publication2016 25th International Conference on Computer Communications and Networks, ICCCN 2016
Place of Publicationusa
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509022793
DOIs
StatePublished - Sep 14 2016
Event25th International Conference on Computer Communications and Networks, ICCCN 2016 - Waikoloa, United States
Duration: Aug 1 2016Aug 4 2016

Conference

Conference25th International Conference on Computer Communications and Networks, ICCCN 2016
Country/TerritoryUnited States
CityWaikoloa
Period08/1/1608/4/16

Cite this