Multi-class traffic morphing for encrypted VoIP communication

6Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a re-identification attack, an adversary analyzes the sizes of intercepted encrypted VoIP packets to infer characteristics of the underlying audio—for example, the language or individual phrases spoken on the encrypted VoIP call. Traffic morphing has been proposed as a general solution for defending against such attacks. In traffic morphing, the sender pads ciphertext to obfuscate the distribution of packet sizes, impairing the adversary’s ability to accurately identify features of the plaintext. This paper makes several contributions to traffic morphing defenses. First, we argue that existing traffic morphing techniques are ineffective against certain re-identification attacks since they (i) require a priori knowledge of what information the adversary is trying to learn about the plaintext (e.g., language, the identity of the speaker, the speaker’s gender, etc.), and (ii) perform poorly with a large number of classes. Second, we introduce new algorithms for traffic morphing that are more generally applicable and do not depend on assumptions about the goals of the adversary. Finally, we evaluate our defenses against re-identification attacks, and show, using a large real-world corpus of spoken audio samples, that our techniques reduce the adversary’s accuracy by 94% with low computational and bandwidth overhead.

Cite

CITATION STYLE

APA

Brad Moore, W., Tan, H., Sherr, M., & Maloof, M. A. (2015). Multi-class traffic morphing for encrypted VoIP communication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8975, pp. 65–85). Springer Verlag. https://doi.org/10.1007/978-3-662-47854-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free