首页> 外文会议>ACM conference on Computer and communications security >Tracking anonymous peer-to-peer VoIP calls on the internet
【24h】

Tracking anonymous peer-to-peer VoIP calls on the internet

机译:跟踪Internet上的匿名点对点VoIP呼叫

获取原文

摘要

Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low latency anonymizing network, they are considered by many people to be both secure and anonymous.In this paper, we present a watermark technique that could be used for effectively identifying and correlating encrypted, peer-to-peer VoIP calls even if they are anonymized by low latency anonymizing networks. This result is in contrast to many people's perception. The key idea is to embed a unique watermark into the encrypted VoIP flow by slightly adjusting the timing of selected packets. Our analysis shows that it only takes several milliseconds time adjustment to make normal VoIP flows highly unique and the embedded watermark could be preserved across the low latency anonymizing network if appropriate redundancy is applied. Our analytical results are backed up by the real-time experiments performed on leading peer-to-peer VoIPclient and on a commercially deployed anonymizing network. Our results demonstrate that (1) tracking anonymous peer-to-peer VoIP calls on the Internet is feasible and (2) low latency anonymizing networks are susceptible to timing attacks.
机译:由于其成本和便利性,同行对等VoIP呼叫越来越受欢迎。当这些呼叫从端到端加密并通过低延迟匿名网络匿名化时,许多人认为它们都是安全和匿名的。在本文中,我们提出了一种可用于有效识别和相关的水印技术,可用于有效识别和相关联的加密,即使通过低延迟匿名网络匿名,对等VoIP调用即使是匿名的。这种结果与许多人的看法相反。关键的想法是通过略微调整所选数据包的定时,将唯一的水印嵌入加密的VoIP流中。我们的分析表明,只需要几毫秒的时间调整,使正常的VoIP流动高度独特,并且如果应用了适当的冗余,则可以在低延迟匿名网络上保留嵌入水印。我们的分析结果由在领先的点对点VoIPClient和商业部署的匿名网络上进行的实时实验来备份。我们的结果表明(1)跟踪互联网上的匿名点对点VoIP呼叫是可行的,并且(2)低延迟匿名网络易于对时序攻击的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号