
VoIP (Voice Over IP) was ranked third among the top 11 technologies of the decade in 2011. It is one of the most popular networking services. As it is readily adopted, the VoIP traffic is increasing steadily. The large amount of data transported by VoIP makes it ideal for creating covert channels. Attacks based on covert channels becomes a new challenge for network security. In this paper, possible covert channels via VoIP are analyzed, and an effective countermeasure to detect hidden messages in both SEQ (Sequence Number) and SSRC (Source Identifier) fields in the RTP protocol during conversation phase is proposed. This proposed method creates a new processing space, in which, normal traffic is analyzed and characterized by a proposed statistical model. This model is used in detecting hidden information in SSRCs and SEQs. Simulation results show that 100% detection rate can be realized. As the proposed model requires only a small amount of training data and no illegal traffic is used in the training, the computational complexity is small and can be used for on-line covert channel detection.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 2 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
