Whispering Packets: Hiding Messages in VoIP Traffic

被引:0
作者
Ren, Hao [1 ]
Pan, Wenqiang [1 ]
Yang, Siqi [1 ]
Zheng, Wenqi [1 ]
机构
[1] China Acad Engn Phys, Inst Comp Applicat, Mianyang, Sichuan, Peoples R China
来源
2024 5TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATION, ICCEA 2024 | 2024年
关键词
VoIP; Covert Channel; Traffic Analysis; Packet Length; COVERT CHANNEL;
D O I
10.1109/ICCEA62105.2024.10603460
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper takes the popular applications WeChat and Enterprise WeChat as examples and investigates the embedding of information in VoIP traffic for data transmission. Exploring the alterations in VoIP traffic characteristics under different vocal environments, this study proposes a covert communication method that transforms the traffic features from silent vocal states to noisy by modifying the length distribution of VoIP traffic. Experimental results demonstrate that this approach achieves channel bandwidths of up to 35kbps and 28kbps in the silent vocal environments of WeChat and Enterprise WeChat, respectively.
引用
收藏
页码:145 / 150
页数:6
相关论文
共 17 条
  • [1] Chaoyang LI, 2022, Journal on Communications, V43, P186
  • [2] Hong Zhao, 2012, Transactions on Data Hiding and Multimedia Security VII: LNCS 7110, P96, DOI 10.1007/978-3-642-28693-3_7
  • [3] CONFINEMENT PROBLEM
    LAMPSON, BW
    [J]. COMMUNICATIONS OF THE ACM, 1973, 16 (10) : 613 - 615
  • [4] A payload-dependent packet rearranging covert channel for mobile VoIP traffic
    Liang, Chen
    Wang, Xianmin
    Zhang, Xiaosong
    Zhang, Yu
    Sharif, Kashif
    Tan, Yu-an
    [J]. INFORMATION SCIENCES, 2018, 465 : 162 - 173
  • [5] Building packet length covert channel over mobile VoIP traffics
    Liang, Chen
    Tan, Yu-an
    Zhang, Xiaosong
    Wang, Xianmin
    Zheng, Jun
    Zhang, Quanxin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 118 : 144 - 153
  • [6] RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network
    Lin, Zinan
    Huang, Yongfeng
    Wang, Jilong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) : 1854 - 1868
  • [7] Mazurczyk W., 2006, New security and control protocol for voip based on steganography and digital watermarking
  • [8] Lost audio packets steganography: the first practical evaluation
    Mazurczyk, Wojciech
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1394 - 1403
  • [9] Mohajeri Moghaddam H., 2012, P 2012 ACM C COMPUTE, P97, DOI DOI 10.1145/2382196.2382210
  • [10] Design and analysis of the covert channel implemented by behaviors of network users
    Qian, Yuwen
    Sun, Ting
    Li, Jun
    Fan, Chang
    Song, Huaju
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2359 - 2370