Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. However, these new technologies pose several challenges in terms of confidentiality of the conversations and anonymity of the conversing parties. Call authentication and encryption techniques provide a way to protect confidentiality, while anonymity is typically preserved by an anonymizing service (anonymous call). This work studies the feasibility of revealing pairs of anonymous and encrypted conversing parties (caller/callee pair of streams) by exploiting the vulnerabilities inherent to VoIP systems. In particular, by exploiting the aperiodic inter-departure time of VoIP packets, we can trivialize each VoIP stream into a binary time-series. We first define a simple yet intuitive metric to gauge the correlation between two VoIP binary streams. Then we propose an effective technique that progressively pairs conversing parties with high accuracy and in a limited amount of time. Our metric and method are justified analytically and validated by experiments on a very large standard corpus of conversational speech. We obtain impressively high pairing accuracy that reaches 97% after 5 minutes of voice conversations. © 2006 IEEE.

Finding ‘Who Is Talking to Whom’ in VoIP Networks via Progressive Stream Clustering / O., Verscheure; M., Vlachos; Anagnostopoulos, Aristidis; P., Frossard; E., Bouillet; P. S., Yu. - (2006), pp. 667-677. (Intervento presentato al convegno 6th International Conference on Data Mining, ICDM 2006 tenutosi a Hong Kong; China) [10.1109/ICDM.2006.72].

Finding ‘Who Is Talking to Whom’ in VoIP Networks via Progressive Stream Clustering

ANAGNOSTOPOULOS, ARISTIDIS;
2006

Abstract

Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. However, these new technologies pose several challenges in terms of confidentiality of the conversations and anonymity of the conversing parties. Call authentication and encryption techniques provide a way to protect confidentiality, while anonymity is typically preserved by an anonymizing service (anonymous call). This work studies the feasibility of revealing pairs of anonymous and encrypted conversing parties (caller/callee pair of streams) by exploiting the vulnerabilities inherent to VoIP systems. In particular, by exploiting the aperiodic inter-departure time of VoIP packets, we can trivialize each VoIP stream into a binary time-series. We first define a simple yet intuitive metric to gauge the correlation between two VoIP binary streams. Then we propose an effective technique that progressively pairs conversing parties with high accuracy and in a limited amount of time. Our metric and method are justified analytically and validated by experiments on a very large standard corpus of conversational speech. We obtain impressively high pairing accuracy that reaches 97% after 5 minutes of voice conversations. © 2006 IEEE.
2006
6th International Conference on Data Mining, ICDM 2006
Anonymity; Binary streams; Stream clustering
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Finding ‘Who Is Talking to Whom’ in VoIP Networks via Progressive Stream Clustering / O., Verscheure; M., Vlachos; Anagnostopoulos, Aristidis; P., Frossard; E., Bouillet; P. S., Yu. - (2006), pp. 667-677. (Intervento presentato al convegno 6th International Conference on Data Mining, ICDM 2006 tenutosi a Hong Kong; China) [10.1109/ICDM.2006.72].
File allegati a questo prodotto
File Dimensione Formato  
VE_2006_11573-332228.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 501.81 kB
Formato Adobe PDF
501.81 kB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/332228
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 14
  • ???jsp.display-item.citation.isi??? 11
social impact