Privacy of encrypted Voice Over Internet Protocol
MetadataShow full item record
In this research, we present a investigative study on how timing-based traffic analysis attacks can be used for recovery of the speech from a Voice Over Internet Protocol (VOIP) conversation by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity period. We use the simple Bayesian classifier and the complex HMM (Hidden Markov Models) classier to evaluate the performance of our attack. Then we describe the usage of acoustic features in our attack to improve the performance. We conclude by presenting a number of problems that need in-depth study in order to be effective in carrying out silence detection based attacks on VOIP systems.
Lella, Tuneesh Kumar (2008). Privacy of encrypted Voice Over Internet Protocol. Master's thesis, Texas A&M University. Texas A&M University. Available electronically from