Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Cleveland State University

2009

Computer networks -- Security measures

Articles 1 - 1 of 1

Full-Text Articles in Engineering

On Traffic Analysis Attacks To Encrypted Voip Calls, Yuanchao Lu Jan 2009

On Traffic Analysis Attacks To Encrypted Voip Calls, Yuanchao Lu

ETD Archive

The increasing popularity of VoIP telephony has brought a lot of attention and concern over security and privacy issues of VoIP communication. This thesis proposes a new class of traffic analysis attacks to encrypted VoIP calls. The goal of these attacks is to detect speaker or speech of encrypted VoIP calls. The proposed traffic analysis attacks exploit silent suppression, an essential feature of VoIP telephony. These attacks are based on application-level features so that the attacks can detect the same speech or the same speaker of different VoIP calls made with different VoIP codecs. We evaluate the proposed attacks by …