Hiding Data in SIP Session
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F14%3A86090813" target="_blank" >RIV/61989100:27240/14:86090813 - isvavai.cz</a>
Výsledek na webu
<a href="http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7296445" target="_blank" >http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=7296445</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/TSP.2015.7296445" target="_blank" >10.1109/TSP.2015.7296445</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Hiding Data in SIP Session
Popis výsledku v původním jazyce
Steganography is method of hiding data inside of existing channels of communications. SIP is one of the key protocols used to implement Voice over IP. It is used for establishing, managing and termination of the communication session. During the call, SIP is used for changing parameters of the session as well as for the transfer of DTMF or instant messages. We analyzed scenario where two users (Alice and Bob) want to exchange hidden message via SIP protocol. Their call is established over Kamailio, SIP Proxy server. We were interested in a number of SIP messages that are exchanged during the call with an average duration of 60 seconds. Then we used SNORT IDS with hard coded rules and AD.SNORT (Anomaly Detection) for detecting irregularities while we increased the number of SIP messages. Finally, we calculated the available steganographic bandwidth, amount of hidden data that can be transferred in these messages. The results obtained from the experiments show that it is possible to create a covert channel over SIP with bandwidth of several kbps.
Název v anglickém jazyce
Hiding Data in SIP Session
Popis výsledku anglicky
Steganography is method of hiding data inside of existing channels of communications. SIP is one of the key protocols used to implement Voice over IP. It is used for establishing, managing and termination of the communication session. During the call, SIP is used for changing parameters of the session as well as for the transfer of DTMF or instant messages. We analyzed scenario where two users (Alice and Bob) want to exchange hidden message via SIP protocol. Their call is established over Kamailio, SIP Proxy server. We were interested in a number of SIP messages that are exchanged during the call with an average duration of 60 seconds. Then we used SNORT IDS with hard coded rules and AD.SNORT (Anomaly Detection) for detecting irregularities while we increased the number of SIP messages. Finally, we calculated the available steganographic bandwidth, amount of hidden data that can be transferred in these messages. The results obtained from the experiments show that it is possible to create a covert channel over SIP with bandwidth of several kbps.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
—
OECD FORD obor
20203 - Telecommunications
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
TSP 2015 : 38th International Conference on Telecommunications and Signal Processing July 9-11, 2015. Prague, Czech Republic
ISBN
978-1-4799-8498-5
ISSN
—
e-ISSN
neuvedeno
Počet stran výsledku
5
Strana od-do
7296445, 1-5
Název nakladatele
IEEE
Místo vydání
Vienna
Místo konání akce
Praha
Datum konání akce
9. 7. 2015
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
000375231000071