Whispering Packets: Hiding Messages in VoIP Traffic

被引:0
作者
Ren, Hao [1 ]
Pan, Wenqiang [1 ]
Yang, Siqi [1 ]
Zheng, Wenqi [1 ]
机构
[1] China Acad Engn Phys, Inst Comp Applicat, Mianyang, Sichuan, Peoples R China
来源
2024 5TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATION, ICCEA 2024 | 2024年
关键词
VoIP; Covert Channel; Traffic Analysis; Packet Length; COVERT CHANNEL;
D O I
10.1109/ICCEA62105.2024.10603460
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper takes the popular applications WeChat and Enterprise WeChat as examples and investigates the embedding of information in VoIP traffic for data transmission. Exploring the alterations in VoIP traffic characteristics under different vocal environments, this study proposes a covert communication method that transforms the traffic features from silent vocal states to noisy by modifying the length distribution of VoIP traffic. Experimental results demonstrate that this approach achieves channel bandwidths of up to 35kbps and 28kbps in the silent vocal environments of WeChat and Enterprise WeChat, respectively.
引用
收藏
页码:145 / 150
页数:6
相关论文
共 17 条
[1]  
Chaoyang LI, 2022, Journal on Communications, V43, P186
[2]  
Hong Zhao, 2012, Transactions on Data Hiding and Multimedia Security VII: LNCS 7110, P96, DOI 10.1007/978-3-642-28693-3_7
[3]   CONFINEMENT PROBLEM [J].
LAMPSON, BW .
COMMUNICATIONS OF THE ACM, 1973, 16 (10) :613-615
[4]   A payload-dependent packet rearranging covert channel for mobile VoIP traffic [J].
Liang, Chen ;
Wang, Xianmin ;
Zhang, Xiaosong ;
Zhang, Yu ;
Sharif, Kashif ;
Tan, Yu-an .
INFORMATION SCIENCES, 2018, 465 :162-173
[5]   Building packet length covert channel over mobile VoIP traffics [J].
Liang, Chen ;
Tan, Yu-an ;
Zhang, Xiaosong ;
Wang, Xianmin ;
Zheng, Jun ;
Zhang, Quanxin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 118 :144-153
[6]   RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network [J].
Lin, Zinan ;
Huang, Yongfeng ;
Wang, Jilong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) :1854-1868
[7]  
Mazurczyk W., 2006, New security and control protocol for voip based on steganography and digital watermarking
[8]   Lost audio packets steganography: the first practical evaluation [J].
Mazurczyk, Wojciech .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) :1394-1403
[9]  
Mohajeri Moghaddam H., 2012, P 2012 ACM C COMPUTE, P97, DOI DOI 10.1145/2382196.2382210
[10]   Design and analysis of the covert channel implemented by behaviors of network users [J].
Qian, Yuwen ;
Sun, Ting ;
Li, Jun ;
Fan, Chang ;
Song, Huaju .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) :2359-2370