All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Hiding Data in SIP Session

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F14%3A86090813" target="_blank" >RIV/61989100:27240/14:86090813 - isvavai.cz</a>

  • Result on the web

    <a href="http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7296445" target="_blank" >http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7296445</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/TSP.2015.7296445" target="_blank" >10.1109/TSP.2015.7296445</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Hiding Data in SIP Session

  • Original language description

    Steganography is method of hiding data inside of existing channels of communications. SIP is one of the key protocols used to implement Voice over IP. It is used for establishing, managing and termination of the communication session. During the call, SIP is used for changing parameters of the session as well as for the transfer of DTMF or instant messages. We analyzed scenario where two users (Alice and Bob) want to exchange hidden message via SIP protocol. Their call is established over Kamailio, SIP Proxy server. We were interested in a number of SIP messages that are exchanged during the call with an average duration of 60 seconds. Then we used SNORT IDS with hard coded rules and AD.SNORT (Anomaly Detection) for detecting irregularities while we increased the number of SIP messages. Finally, we calculated the available steganographic bandwidth, amount of hidden data that can be transferred in these messages. The results obtained from the experiments show that it is possible to create a covert channel over SIP with bandwidth of several kbps.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    TSP 2015 : 38th International Conference on Telecommunications and Signal Processing July 9-11, 2015. Prague, Czech Republic

  • ISBN

    978-1-4799-8498-5

  • ISSN

  • e-ISSN

    neuvedeno

  • Number of pages

    5

  • Pages from-to

    7296445, 1-5

  • Publisher name

    IEEE

  • Place of publication

    Vienna

  • Event location

    Praha

  • Event date

    Jul 9, 2015

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000375231000071