Tracking anonymous peer-to-peer VoIP calls on the internet. Wang, X., Chen, S., & Jajodia, S. November 2005.
Tracking anonymous peer-to-peer VoIP calls on the internet [link]Paper  doi  abstract   bibtex   
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low latency anonymizing network, they are considered by many people to be both secure and anonymous.In this paper, we present a watermark technique that could be used for effectively identifying and correlating encrypted, peer-to-peer VoIP calls even if they are anonymized by low latency anonymizing networks. This result is in contrast to many people\textquoterights perception. The key idea is to embed a unique watermark into the encrypted VoIP flow by slightly adjusting the timing of selected packets. Our analysis shows that it only takes several milliseconds time adjustment to make normal VoIP flows highly unique and the embedded watermark could be preserved across the low latency anonymizing network if appropriate redundancy is applied. Our analytical results are backed up by the real-time experiments performed on leading peer-to-peer VoIP client and on a commercially deployed anonymizing network. Our results demonstrate that (1) tracking anonymous peer-to-peer VoIP calls on the Internet is feasible and (2) low latency anonymizing networks are susceptible to timing attacks.
@conference {WangCJ05,
	title = {Tracking anonymous peer-to-peer VoIP calls on the internet},
	booktitle = {Proceedings of the ACM Conference on Computer and Communications Security},
	year = {2005},
	month = {November},
	pages = {81{\textendash}91},
	publisher = {ACM  New York, NY, USA},
	organization = {ACM  New York, NY, USA},
	abstract = {Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low latency anonymizing network, they are considered by many people to be both secure and anonymous.In this paper, we present a watermark technique that could be used for effectively identifying and correlating encrypted, peer-to-peer VoIP calls even if they are anonymized by low latency anonymizing networks. This result is in contrast to many people{\textquoteright}s perception. The key idea is to embed a unique watermark into the encrypted VoIP flow by slightly adjusting the timing of selected packets. Our analysis shows that it only takes several milliseconds time adjustment to make normal VoIP flows highly unique and the embedded watermark could be preserved across the low latency anonymizing network if appropriate redundancy is applied. Our analytical results are backed up by the real-time experiments performed on leading peer-to-peer VoIP client and on a commercially deployed anonymizing network. Our results demonstrate that (1) tracking anonymous peer-to-peer VoIP calls on the Internet is feasible and (2) low latency anonymizing networks are susceptible to timing attacks.},
	keywords = {anonymity, P2P},
	isbn = {1-59593-226-7},
	doi = {10.1145/1102120.1102133},
	url = {http://portal.acm.org/citation.cfm?id=1102120.1102133},
	author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}
}

Downloads: 0