Multi-class Traffic Morphing for Encrypted VoIP Communication

作者: W. Brad Moore , Henry Tan , Micah Sherr , Marcus A. Maloof

DOI: 10.1007/978-3-662-47854-7_5

关键词:

摘要: In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics underlying audio—for example, language or individual phrases spoken on call. Traffic morphing has been proposed as general solution for defending against such attacks. traffic morphing, sender pads ciphertext obfuscate distribution packet sizes, impairing adversary’s ability accurately identify features plaintext.

参考文章(23)
Fabian Monrose, Scott E. Coull, Charles V. Wright, Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. network and distributed system security symposium. ,(2009)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Qixiang Sun, D.R. Simon, Yi-Min Wang, W. Russell, V.N. Padmanabhan, Lili Qiu, Statistical identification of encrypted Web browsing traffic ieee symposium on security and privacy. pp. 19- 30 ,(2002) , 10.1109/SECPRI.2002.1004359
Tao Wang, Ian Goldberg, Improved website fingerprinting on Tor workshop on privacy in the electronic society. pp. 201- 212 ,(2013) , 10.1145/2517840.2517851
Kevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton, Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail ieee symposium on security and privacy. pp. 332- 346 ,(2012) , 10.1109/SP.2012.28
L.A. Khan, M.S. Baig, Amr M. Youssef, Speaker recognition from encrypted VoIP communications Digital Investigation. ,vol. 7, pp. 65- 73 ,(2010) , 10.1016/J.DIIN.2009.10.001
Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose, Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks ieee symposium on security and privacy. pp. 3- 18 ,(2011) , 10.1109/SP.2011.34
Dominik Herrmann, Rolf Wendolsky, Hannes Federrath, Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier ieee international conference on cloud computing technology and science. pp. 31- 42 ,(2009) , 10.1145/1655008.1655013
Marc Liberatore, Brian Neil Levine, Inferring the source of encrypted HTTP connections Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 255- 263 ,(2006) , 10.1145/1180405.1180437
Roberto Perdisci, Prahlad Fogla, Oleg Kolesnikov, Wenke Lee, Monirul Sharif, Polymorphic blending attacks usenix security symposium. pp. 17- ,(2006)