Even if information hiding can be used for licit purposes, it is in- creasingly exploited by malware to ex ltrate data or to coordinate a acks in a stealthy manner. erefore, investigating new methods for creating covert channels is fundamental to completely assess the security of the Internet. Since the popularity of the carrier plays a major role, this paper proposes to hide data within VoIP tra c. Speci cally, we exploit Voice Activity Detection (VAD), which sus- pends the transmission during speech pauses to reduce bandwidth requirements. To create the covert channel, our method transforms a VAD-activated VoIP stream into a non-VAD one. en, hidden information is injected into fake RTP packets generated during silence intervals. Results indicate that steganographically modi- ed VAD-activated VoIP streams o er a good trade-o between stealthiness and steganographic bandwidth.

A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression

L Caviglione
2017

Abstract

Even if information hiding can be used for licit purposes, it is in- creasingly exploited by malware to ex ltrate data or to coordinate a acks in a stealthy manner. erefore, investigating new methods for creating covert channels is fundamental to completely assess the security of the Internet. Since the popularity of the carrier plays a major role, this paper proposes to hide data within VoIP tra c. Speci cally, we exploit Voice Activity Detection (VAD), which sus- pends the transmission during speech pauses to reduce bandwidth requirements. To create the covert channel, our method transforms a VAD-activated VoIP stream into a non-VAD one. en, hidden information is injected into fake RTP packets generated during silence intervals. Results indicate that steganographically modi- ed VAD-activated VoIP streams o er a good trade-o between stealthiness and steganographic bandwidth.
2017
Istituto di Studi sui Sistemi Intelligenti per l'Automazione - ISSIA - Sede Bari
Inglese
The First International Workshop on Criminal Use of Information Hiding (CUING)
Sì, ma tipo non specificato
29/8/2017, 1/9/2017
Reggio Calabria, Italia
information hiding
network steganography
traffic morphing
1
none
S. Schmidt; J. Keller; W. Mazurczyk; L. Caviglione
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/332918
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact