Even if information hiding can be used for licit purposes, it is in- creasingly exploited by malware to ex ltrate data or to coordinate a acks in a stealthy manner. erefore, investigating new methods for creating covert channels is fundamental to completely assess the security of the Internet. Since the popularity of the carrier plays a major role, this paper proposes to hide data within VoIP tra c. Speci cally, we exploit Voice Activity Detection (VAD), which sus- pends the transmission during speech pauses to reduce bandwidth requirements. To create the covert channel, our method transforms a VAD-activated VoIP stream into a non-VAD one. en, hidden information is injected into fake RTP packets generated during silence intervals. Results indicate that steganographically modi- ed VAD-activated VoIP streams o er a good trade-o between stealthiness and steganographic bandwidth.

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

L Caviglione
2017

Abstract

Even if information hiding can be used for licit purposes, it is in- creasingly exploited by malware to ex ltrate data or to coordinate a acks in a stealthy manner. erefore, investigating new methods for creating covert channels is fundamental to completely assess the security of the Internet. Since the popularity of the carrier plays a major role, this paper proposes to hide data within VoIP tra c. Speci cally, we exploit Voice Activity Detection (VAD), which sus- pends the transmission during speech pauses to reduce bandwidth requirements. To create the covert channel, our method transforms a VAD-activated VoIP stream into a non-VAD one. en, hidden information is injected into fake RTP packets generated during silence intervals. Results indicate that steganographically modi- ed VAD-activated VoIP streams o er a good trade-o between stealthiness and steganographic bandwidth.
2017
Istituto di Studi sui Sistemi Intelligenti per l'Automazione - ISSIA - Sede Bari
information hiding
network steganography
traffic morphing
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/332918
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact