메뉴 건너뛰기




Volumn , Issue , 2007, Pages 371-380

An assessment of VoIP covert channel threats

Author keywords

Channel capacity; Covert communication; Security of data; Voice over Ip; VoIP covert channel; Watermarking

Indexed keywords

CHANNEL CAPACITY; COVERT COMMUNICATION; SECURITY OF DATA; VOICE OVER IP; VOIP COVERT CHANNEL; WATERMARKING;

EID: 51349112497     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOM.2007.4550357     Document Type: Conference Paper
Times cited : (42)

References (34)
  • 1
    • 51349099633 scopus 로고    scopus 로고
    • Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition, December 1985.
    • Department of Defense. Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition, December 1985.
  • 4
    • 33646054897 scopus 로고    scopus 로고
    • Felix C. Freiling, Thorsten Holz, and Georg Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-ofservice attacks. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS), 3679 of Lecture Motes in Computer Science, pages 319-335, September 2005.
    • Felix C. Freiling, Thorsten Holz, and Georg Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-ofservice attacks. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS), volume 3679 of Lecture Motes in Computer Science, pages 319-335, September 2005.
  • 6
    • 51349115835 scopus 로고    scopus 로고
    • ITU-T Recommendation H.323. Infrastructure of audio-visual services, systems and terminal equipment for audio-visual services: Packet-based multimedia communications systems. Technical report, Telecommunication Standardization Sector of ITU, 2000. Draft Version 4
    • ITU-T Recommendation H.323. Infrastructure of audio-visual services - systems and terminal equipment for audio-visual services: Packet-based multimedia communications systems. Technical report, Telecommunication Standardization Sector of ITU, 2000. Draft Version 4.
  • 8
    • 51349101008 scopus 로고    scopus 로고
    • International Telecommunication Union. Methods for subjective determination of transmission quality. Recommendation P.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland, August 1996.
    • International Telecommunication Union. Methods for subjective determination of transmission quality. Recommendation P.800, Telecommunication Standardization Sector of ITU, Geneva, Switzerland, August 1996.
  • 9
    • 51349092225 scopus 로고    scopus 로고
    • Perceptual evaluation of speech quality (PESQ), an objective method for end-to-end speech quality assessment of narrowband telephone networks and speech codecs
    • International Telecommunication Union, Geneva, Switzerland, February
    • International Telecommunication Union. Perceptual evaluation of speech quality (PESQ), an objective method for end-to-end speech quality assessment of narrowband telephone networks and speech codecs. Recommendation, Telecommunication Standardization Sector of ITU, Geneva, Switzerland, February 2001.
    • (2001) Recommendation, Telecommunication Standardization Sector of ITU
  • 10
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, October 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 13
    • 78751619696 scopus 로고    scopus 로고
    • New security and control protocol for voip based on steganography and digital watermarking
    • W. Mazurczyk and Z. Kotulski. New security and control protocol for voip based on steganography and digital watermarking. Annales UMCS, Informatica, 2006.
    • (2006) Annales UMCS, Informatica
    • Mazurczyk, W.1    Kotulski, Z.2
  • 14
    • 33751314840 scopus 로고    scopus 로고
    • Development of a voip system implementing a high quality packet loss concealment technique
    • Saskatoon Inn, May
    • Naofumi Aoki. Development of a voip system implementing a high quality packet loss concealment technique. In Canadian Conference on Electrical and Computer Engineering 2005, Saskatoon Inn, May 2005.
    • (2005) Canadian Conference on Electrical and Computer Engineering 2005
    • Aoki, N.1
  • 15
    • 84943817322 scopus 로고
    • Error detecting and error correcting codes
    • April
    • R.W. Hamming. Error detecting and error correcting codes. Bell System Technical Journal, 29:147-160, April 1950.
    • (1950) Bell System Technical Journal , vol.29 , pp. 147-160
    • Hamming, R.W.1
  • 18
    • 2942749266 scopus 로고    scopus 로고
    • Bluebox: A policy-driven, hostbased intrusion detection system
    • Suresh N. Chari and Pau-Chen Cheng. Bluebox: A policy-driven, hostbased intrusion detection system. ACM Trans. Inf. Syst. Secur., 6(2):173-200, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.2 , pp. 173-200
    • Chari, S.N.1    Cheng, P.-C.2
  • 21
    • 51349087504 scopus 로고    scopus 로고
    • J. D. Gordy and L. T. Bruton. Performance evaluation of digital audio watermarking algorithms
    • J. D. Gordy and L. T. Bruton. Performance evaluation of digital audio watermarking algorithms.
  • 23
    • 33745384504 scopus 로고    scopus 로고
    • Detection of audio covert channels using statistical footprints of hidden messages
    • Hamza Özer, Bülent Sankur, Nasir Memon, and Ismail Avcibas. Detection of audio covert channels using statistical footprints of hidden messages. Digital Signal Processing, 16(4):389-401, 2006.
    • (2006) Digital Signal Processing , vol.16 , Issue.4 , pp. 389-401
    • Özer, H.1    Sankur, B.2    Memon, N.3    Avcibas, I.4
  • 25
    • 51349096746 scopus 로고    scopus 로고
    • Kanaan Jemili Rade Petrovic, Joseph M. Winograd and Eric Metois, Data hiding within audio signals. Technical Report 2, Facta Universitatis, Nis, Serbia, October 1999. A version of this paper was presented at the fourth Conference Telecommunicationsin Modern Satellite and Cable Services.
    • Kanaan Jemili Rade Petrovic, Joseph M. Winograd and Eric Metois, Data hiding within audio signals. Technical Report 2, Facta Universitatis, Nis, Serbia, October 1999. A version of this paper was presented at the fourth Conference Telecommunicationsin Modern Satellite and Cable Services.
  • 27
    • 51349126614 scopus 로고    scopus 로고
    • M.R.R. Healy B.P. Bogert and J.W. Tukey. The quefrency alanysis of time series for echoes: cepstrum, pseudo-autocovariance, crosscepstrum, and saphe cracking. Symposium Time Series Analysis, 1963.
    • M.R.R. Healy B.P. Bogert and J.W. Tukey. The quefrency alanysis of time series for echoes: cepstrum, pseudo-autocovariance, crosscepstrum, and saphe cracking. Symposium Time Series Analysis, 1963.
  • 30
    • 31344443662 scopus 로고    scopus 로고
    • Audio steganalysis with content-independent distortion measures
    • I. Avcibas. Audio steganalysis with content-independent distortion measures. Signal Processing Letters, 2006.
    • (2006) Signal Processing Letters
    • Avcibas, I.1
  • 33
    • 0036530067 scopus 로고    scopus 로고
    • Statistical evaluation of image quality measures
    • April
    • I. Avcibas, B. Sankur, and K. Sayood. Statistical evaluation of image quality measures. Journal of Electronic Imaging, 11(2):206-223, April 2002.
    • (2002) Journal of Electronic Imaging , vol.11 , Issue.2 , pp. 206-223
    • Avcibas, I.1    Sankur, B.2    Sayood, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.