Tracking encrypted voip calls via robust hashing of network flows

Baris Coskun, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP flow is identified by a short binary string, called the robust hash, using variations on the flow's bitrate over time. These robust hashes are then used to detect pairs of parties communicating with each other. In summary, if two parties are communication with each other then they have a pair of VoIP flows having similar robust hashes with high probability. The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow depending on the underlying audio content. ii) Encryption typically doesn't change the bitrate of a VoIP flow. Our experiments show that the proposed scheme is able to identify Skype VoIP flows even under various network impairments such as packet delays, jitter and packet drops.

Original languageEnglish (US)
Title of host publication2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings
Pages1818-1821
Number of pages4
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Dallas, TX, United States
Duration: Mar 14 2010Mar 19 2010

Other

Other2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010
CountryUnited States
CityDallas, TX
Period3/14/103/19/10

Fingerprint

Hash functions
Jitter
Cryptography
Communication
Experiments

Keywords

  • Call tracking
  • Robust hash
  • VoIP security

ASJC Scopus subject areas

  • Signal Processing
  • Software
  • Electrical and Electronic Engineering

Cite this

Coskun, B., & Memon, N. (2010). Tracking encrypted voip calls via robust hashing of network flows. In 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings (pp. 1818-1821). [5495398] https://doi.org/10.1109/ICASSP.2010.5495398

Tracking encrypted voip calls via robust hashing of network flows. / Coskun, Baris; Memon, Nasir.

2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings. 2010. p. 1818-1821 5495398.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Coskun, B & Memon, N 2010, Tracking encrypted voip calls via robust hashing of network flows. in 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings., 5495398, pp. 1818-1821, 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010, Dallas, TX, United States, 3/14/10. https://doi.org/10.1109/ICASSP.2010.5495398
Coskun B, Memon N. Tracking encrypted voip calls via robust hashing of network flows. In 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings. 2010. p. 1818-1821. 5495398 https://doi.org/10.1109/ICASSP.2010.5495398
Coskun, Baris ; Memon, Nasir. / Tracking encrypted voip calls via robust hashing of network flows. 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings. 2010. pp. 1818-1821
@inproceedings{f611588b761640d3b89985551fd3a888,
title = "Tracking encrypted voip calls via robust hashing of network flows",
abstract = "In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP flow is identified by a short binary string, called the robust hash, using variations on the flow's bitrate over time. These robust hashes are then used to detect pairs of parties communicating with each other. In summary, if two parties are communication with each other then they have a pair of VoIP flows having similar robust hashes with high probability. The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow depending on the underlying audio content. ii) Encryption typically doesn't change the bitrate of a VoIP flow. Our experiments show that the proposed scheme is able to identify Skype VoIP flows even under various network impairments such as packet delays, jitter and packet drops.",
keywords = "Call tracking, Robust hash, VoIP security",
author = "Baris Coskun and Nasir Memon",
year = "2010",
doi = "10.1109/ICASSP.2010.5495398",
language = "English (US)",
isbn = "9781424442966",
pages = "1818--1821",
booktitle = "2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings",

}

TY - GEN

T1 - Tracking encrypted voip calls via robust hashing of network flows

AU - Coskun, Baris

AU - Memon, Nasir

PY - 2010

Y1 - 2010

N2 - In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP flow is identified by a short binary string, called the robust hash, using variations on the flow's bitrate over time. These robust hashes are then used to detect pairs of parties communicating with each other. In summary, if two parties are communication with each other then they have a pair of VoIP flows having similar robust hashes with high probability. The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow depending on the underlying audio content. ii) Encryption typically doesn't change the bitrate of a VoIP flow. Our experiments show that the proposed scheme is able to identify Skype VoIP flows even under various network impairments such as packet delays, jitter and packet drops.

AB - In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP flow is identified by a short binary string, called the robust hash, using variations on the flow's bitrate over time. These robust hashes are then used to detect pairs of parties communicating with each other. In summary, if two parties are communication with each other then they have a pair of VoIP flows having similar robust hashes with high probability. The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow depending on the underlying audio content. ii) Encryption typically doesn't change the bitrate of a VoIP flow. Our experiments show that the proposed scheme is able to identify Skype VoIP flows even under various network impairments such as packet delays, jitter and packet drops.

KW - Call tracking

KW - Robust hash

KW - VoIP security

UR - http://www.scopus.com/inward/record.url?scp=78049385231&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78049385231&partnerID=8YFLogxK

U2 - 10.1109/ICASSP.2010.5495398

DO - 10.1109/ICASSP.2010.5495398

M3 - Conference contribution

SN - 9781424442966

SP - 1818

EP - 1821

BT - 2010 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2010 - Proceedings

ER -