Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users
Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. (Datavetenskap)
2011 (English)In: Future Challenges in Security and Privacy for Academia and Industry / [ed] Camenisch, J.; Fischer-Hübner, S.; Murayama, Y.; Portmann, A.; Rieder, C., Springer-Verlag New York, 2011, 247-258 p.Conference paper, (Refereed)
Abstract [en]

Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the calling records of a particular user in this way since the linkability between a user and a IP address is uncertain: users may regularly change or share IP addresses. Unfortunately, VoIP flows may contain human-specific features. For example, users sometimes are required to provide Personal identification numbers (PINs) to a voice server for authentication and thus the key-click patterns of entering a PIN can be extracted from VoIP flows for user recognition. We invited 31 subjects to enter 4-digital PINs on a virtual keypad of a popular VoIP user-agent with mouse clicking. Employing machine learning algorithms, we achieved average equal error rates of 10-29% for user verification and a hitting rate up to 65% with a false positive rate around 1% for user classification.

Place, publisher, year, edition, pages
Springer-Verlag New York, 2011. 247-258 p.
Series
IFIP Advances in Information and Communication Technology, 354
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:kau:diva-11962DOI: 10.1007/978-3-642-21424-0_20ISI: 000302988300020ISBN: 978-3-642-21423-3 (print)ISBN: 978-3-642-21424-0 (print)OAI: oai:DiVA.org:kau-11962DiVA: diva2:507197
Conference
26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011
Available from: 2012-03-02 Created: 2012-03-02 Last updated: 2013-10-10Bibliographically approved
In thesis
1. Unwanted Traffic and Information Disclosure in VoIP Networks: Threats and Countermeasures
Open this publication in new window or tab >>Unwanted Traffic and Information Disclosure in VoIP Networks: Threats and Countermeasures
2012 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The success of the Internet has brought significant changes to the telecommunication industry. One of the remarkable outcomes of this evolution is Voice over IP (VoIP), which enables realtime voice communications over packet switched networks for a lower cost than traditional public switched telephone networks (PSTN). Nevertheless, security and privacy vulnerabilities pose a significant challenge to hindering VoIP from being widely deployed. The main object of this thesis is to define and elaborate unexplored security and privacy risks on standardized VoIP protocols and their implementations as well as to develop suitable countermeasures. Three research questions are addressed to achieve this objective:

Question 1:  What are potential unexplored threats in a SIP VoIP network with regard to availability, confidentiality and privacy by means of unwanted traffic and information disclosure?

Question 2:  How far are existing security and privacy mechanisms sufficient to counteract these threats and what are their shortcomings?

Question 3:  How can new countermeasures be designed for minimizing or preventing the consequences caused by these threats efficiently in practice?

Part I of the thesis concentrates on the threats caused by "unwanted traffic", which includes Denial of Service (DoS) attacks and voice spam. They generate unwanted traffic to consume the resources and annoy users. Part II of this thesis explores unauthorized information disclosure in VoIP traffic. Confidential user data such as calling records, identity information, PIN code and data revealing a user's social networks might be disclosed or partially disclosed from VoIP traffic. We studied both threats and countermeasures by conducting experiments or using theoretical assessment. Part II also presents a survey research related to threats and countermeasures for anonymous VoIP communication.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2012. 32 p.
Series
Karlstad University Studies, ISSN 1403-8099 ; 2012:28
Keyword
SIP, VoIP, security, Denial of Service, Vulnerability analysis, timing attacks, Spam, DTMF, SIP, RTP
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-13408 (URN)978-91-7063-432-1 (ISBN)
Public defence
2012-09-14, 1 B 306, Universitetsgatan 2, Karlstad, 10:15 (English)
Opponent
Supervisors
Available from: 2012-08-28 Created: 2012-05-29 Last updated: 2012-08-28Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Zhang, Ge
By organisation
Department of Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 46 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf