Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • Persone
  • Pubblicazioni
  • Strutture
  • Competenze

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • Persone
  • Pubblicazioni
  • Strutture
  • Competenze
  1. Pubblicazioni

Exploiting IP telephony with silence suppression for hidden data transfers

Articolo
Data di Pubblicazione:
2018
Abstract:
Information hiding is increasingly used by malware for creating covert channels to exfiltrate data, orchestrate attacks, as well as to download additional code for extending its functionalities at runtime. Since the popularity of the carrier used for embedding secrets is fundamental to guarantee a suitable degree of stealthiness, this paper investigates how to create a covert channel within ubiquitous Voice over IP (VoIP) conversations. Specifically, we propose to hide information in fake RTP packets generated during silence intervals obtained by transforming a VoIP stream with Voice Activity Detection (VAD) into a non-VAD one. Experimental results collected in different scenarios indicate that embedding a covert channel in the VAD-activated VoIP stream offers a good trade-off between stealthiness and steganographic bandwidth. Guidelines to detect and mitigate information-hiding-capable threats targeting IP telephony applications are also provided.
Tipologia CRIS:
01.01 Articolo in rivista
Keywords:
Covert Channel; VoIP; Information Hiding; Network Security
Elenco autori:
Caviglione, Luca
Autori di Ateneo:
CAVIGLIONE LUCA
Link alla scheda completa:
https://iris.cnr.it/handle/20.500.14243/370629
Pubblicato in:
COMPUTERS & SECURITY
Journal
  • Dati Generali

Dati Generali

URL

https://www.sciencedirect.com/science/article/pii/S0167404818305777
  • Utilizzo dei cookie

Realizzato con VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)