I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas.

Slides:



Advertisements
Similar presentations
9-1 Chapter 9 - Communication Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Principles of Computer.
Advertisements

Networks and Telecommunications (on OLC)
VoIP Models for System Performance Evaluation Farooq Khan IEEE Interim Meeting Vancouver, BC, Canada January 12-16, 2004.
General Information Software Robot Benri. Characteristics 1. Connect up to 16 cameras. 2. Do six different type of detections. 3. Define sub-areas where.
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Figure 7-1 Softswitch Components Signaling Gateway Feature Server Softswitch Universal Media Gateway SGCP SIP MGCP MGCP (Media Gateway Control Protocol)
David Reed Chief Strategy Officer, CableLabs June 8, 2004
Johan Garcia Karlstads Universitet Datavetenskap 1 Datakommunikation II Signaling/Voice over IP / SIP Based on material from Henning Schulzrinne, Columbia.
Windows NT server and workstation Name: Li Shen Course: COCS541 Instructor: Mort Anvari.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
SkypeMorph: Protocol Obfuscation for Tor Bridges
The testbed environment for this research to generate real-world Skype behaviors for analyzation is as follows: A NAT-ed LAN consisting of 7 machines running.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Chapter 12 Network Security.
Skype & its protocol Aaron Loar CPE 401. Introduction Skype’s Background Topology 3 Node Types Questions.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
Security in IP telephony (VoIP) David Andersson Erik Martinsson.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Censorship Resistance: Parrots Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the.
Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.
VOIP (Voice Over Internet Protocol) CDA 4527 Fall 2006.
Copyright Texas Instruments Inc. Tom Flanagan Director, Technical Strategy DSP Systems
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
The Parrot is Dead: Observing Unobservable Network Communications
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 03 PHILLIPA GILL STONY BROOK UNIVERSITY, COMPUTER SCIENCE ACKS: SLIDES BASED ON MATERIAL FROM NICK WEAVER’S.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Deep Packet Inspection-- The Future of Next Generation Service Delivery Vin Costello—Vice President and General Manager—Americas Allot Communications.
Successes and Failures applying to SaTC/TWC/TC/CT Nikita Borisov University of Illinois at Urbana- Champaign.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 12.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
1 CSCD 433/533 Advanced Networks Lecture 2 Network Review Spring 2016 Reading: Chapter 1.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
Presented by Maria Shah. Road Map  VoIP Benefits  VoIP Protocols  VoIP Analysis  Advantages  Disadvantages  Implementing  Security  Summary.
Skype.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
Presented by Nelson Mandela Date 7th February 2017
Understand Wide Area Networks (WANs)
CS590B/690B Detecting Network Interference (FALL 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
Practical Censorship Evasion Leveraging Content Delivery Networks
VOICE AND VIDEO OVER IP VOIP, RTP, RSVP.
Understanding the OSI Reference Model
Connecting Networks Repeater: physical layer Bridge: data link layer
CSCD 433 Advanced Networks
PPPoE Internet Point to Point Protocol over Ethernet
Anupam Das , Nikita Borisov
CCN – revision lecture.
Presentation transcript:

I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas Riedl (University of Illinois at Urbana-Champaign) Nikita Borisov (University of Illinois at Urbana-Champaign) Andrew Singer (University of Illinois at Urbana-Champaign)

Internet Censorship The Internet is a big threat to repressive regimes! Repressive regimes censor the Internet: IP filtering, DNS hijacking, Deep packet-inspection, etc. Circumvention systems NDSS

New stage in the arms race The threat model has changed Past: detect circumvention end-points Now: detect circumvention traffic also We need traffic unobservability against passive, active, or proactive analysis NDSS

A recent approach A promising approach: hide circumvention traffic within popular Internet protocols Censors are unlikely to completely block that protocol A new trend: mimic the target protocol SkypeMorph, StegoTorus, and CensorSpoofer (CCS12) Its hard to imitate network protocols The Parrot is Dead: Observing Unobservable Network Communications [Oakland13] NDSS FLAWED

Our approach We seek the same objective, but take a different approach: Run the target protocol By running the target protocol no need to worry about implementation quirks, bugs, protocol details Challenge: how to efficiently encapsulate traffic into the target protocol NDSS

FreeWave: IP over Voice-over-IP Target protocol: Voice-over IP (VoIP) Why VoIP Widely used protocol (only 663 Million Skype users) Collateral damage to block Encrypted How to hide? The dial-up modems are back! NDSS

FreeWave architecture NDSS Client FreeWave Server

System components NDSS

MoDem component A typical acoustic modem QAM modulation Reliable transmission Turbo codes Use Preambles NDSS

Evaluations NDSS

FreeWaves unobservability Comprehensive unobservability at the protocol level Traffic analysis (packet rates and sizes) Fixed rate codecs (e.g., G.7 series) Not an issue Variable bit-rates (e.g., Skypes SILK) Simple analysis Superimpose with recoded conversation NDSS

Server obfuscation NDSS Client FreeWave Server

Future directions Embed into Video of VoIP Find other protocol to tunnel Look for better efficiency NDSS IP over Voice-over-IP Voice over IP over …

Questions! NDSS