Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.

Slides:



Advertisements
Similar presentations
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Advertisements

An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002
Camarillo / Schulzrinne / Kantola November 26th, 2001 SIP over SCTP performance analysis
20 03 TASTE OF RESEARCH SUMMER SCHOLARSHIPS Author: Wei Zhang Supervisor: Tim Moors Efficient Voice Over Wireless Network Abstract The objective of this.
UDP - User Datagram Protocol UDP – User Datagram Protocol Author : Nir Shafrir Reference The TCP/IP Guide - ( Version Version.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
TCP/IP Lecture Extra. TCP/IP Developed by DARPA (Defense Advanced Research Projects) TCP is a connection-oriented transport protocol that sends data as.
Chapter 14 User Datagram Program (UDP)
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Anonymity Cs5090: Advanced Computer Networks, fall 2004 Department of Computer Science Michigan Tech University Byung Choi.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Data Exchange Packet switching  Packet switching breaks data in to packets before sending it through a network, then reassembles it at the other end –
Embedding Covert Channels into TCP/IP
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
STEGANOGRPAHY [APPLICATION – I]
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
CS 218 F 2003 Nov 3 lecture:  Streaming video/audio  Adaptive encoding (eg, layered encoding)  TCP friendliness References: r J. Padhye, V.Firoiu, D.
1 CMSCD1011 Introduction to Computer Audio Lecture 10: Streaming audio for Internet transmission Dr David England School of Computing and Mathematical.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Computer Networks Lecture 5 Packet Switching & Circuit Switching, Causes of impairment Lahore Leads University.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
An Adaptive Steganography Scheme for Voice over IP Hui Tian ; Ke Zhou ; Hong Jiang ; Yongfeng Huang ; Jin Liu ; Dan Feng Circuits and Systems, ISCAS.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
HICCUPS: Hidden Communication System for Corrupted Networks From: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje.
FOOTPRINTING STEGANOGRAPHY.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Steganography
Welcome
LACK - a VoIP steganographic method
Visit for more Learning Resources
RTP and RTSP Realtime Transport Protocol
Encryption, Cryptography, and Steganography:
Net 323 D: Networks Protocols
Data hiding based Hamming code
Protocol Application TCP/IP Layer Model
WJEC GCSE Computer Science
UDP Principles (Chapter 24) (User Datagram Protocol)
NET 323D: Networks Protocols
Lecture 36.
Lecture 36.
Presentation transcript:

Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum. Retrieved 11 February Author: Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski. 1

Outline Steganography Steganography threat Network steganography technology. – HICCUPS (Hidden Communication System for Corrupted Networks) – LACK(Lost Audio Packet Steganography) – Protocol Steganography for VoIP application Conclusion Reference 2

Steganography Def: The communication of secret messages inside a perfectly innocent carrier. History – 494 B.C Histiaeus use Head TATTOO to send resistance message. Limitation – The rule of thumb is that we can use 10 percent of a carrier file’s size to smuggle data. 3

Steganography (cont.) – Network steganography The modern version steganography which hide information using the protocol itself inside of using digital files. Advantage: – Detecting their existence is nearly impossible. – The longer the communication is, the longer the secret message we can send. 4

Steganography threat Contradiction between threat and security? In October 2001, the New York Times published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack. 5 Spy Steal Bad guy VoIP Steganographic message

Network steganography technology LACK(Lost Audio Packet Steganography) – Hide information in packet delay. HICCUPS (Hidden Communication System for Corrupted Networks) – Disguise information as natural “distortion” or noise. Protocol Steganography for VoIP application – Hide information in unused data fields. 6

Lost Audio Packet Steganography TCP/IP application layer steganography technique. – Substitute RTP (Real-time Transport Protocol ) packet voice payload with bits of the steganogram. – Delay transmit the RTP packet which hide steganogram. Detect way: – If the user tried to hide too many secret packets. It cause suspicious packet delay. 7

Lost Audio Packet Steganography 8 Picture form [3]

Hidden Communication System for Corrupted Networks Work on wireless local area networks. Use checksum to verify which frame has steganogram. Must have special hardware which do not discard the frame with wrong checksum. Very fast(200 Kbs/sec) Detect: – There are too many corrupted frame. – Detect the differences between the dropped and retransmitted frames. 9

Protocol Steganography for VoIP application Protocol Steganography – A common name for a group of methods that use another aspect of IP: packet header fields. Protocol Steganography for VoIP application – RTP Free/Unused Fields Steganograph. 10

Protocol Steganography for VoIP application RTP Free/Unused Fields Steganograph 11

Conclusion Comparison of three mechanisms. 12 Type AdvantageHardest to detect Very fast Hardest to detect ShortageDifficult to useLowest information density Easiest to use Performance 200 kilobits per second160 bits per second1–300 bits per second

Conclusion The anonymity of steganography might be good for privacy, but it also multiplies the threats to individuals, societies, and states. 13

Reference [1]Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski (February 2010). "Vice Over IP: The VoIP Steganography Threat". IEEE Spectrum. Retrieved 11 February [2]Wojciech Mazurczyk and Krzysztof Szczypiorski (November 2008). "Steganography of VoIP Streams". Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico. Retrieved 16 June [3]Wojciech Mazurczyk, Jozef Lubacz, Krzysztof Szczypiorski. “On Steganography in Lost Audio Packets.” [4] Szczypiorski, K.: HICCUPS: Hidden Communication System for Coruppted Networks. In Proc: The Tenth International MultiConference on Advanced Computer Systems ACS'2003. Midzyzdroje October pp [5] [6] Steganography of VoIP Streams. In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II – Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of OnTheMove Federated Conferences and Workshops: The 3rd International Symposium on Information Security (IS'08), Monterrey, Mexico, November 9-14, 2008, pp