2009 International Conference on Multimedia Information Networking and Security 2009
DOI: 10.1109/mines.2009.227
|View full text |Cite
|
Sign up to set email alerts
|

A Security Model for VoIP Steganography

Abstract: Abstract-In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have been identified in VoIP protocols. To avoid such security gaps in the future, we argue that stegocommunication should be added to the traditional list of network threats: interruption, interception, modification, fabrication. The stegocommunication threat arises when the communication cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…In addition, continuing with the application of the snowball technique [25] to the conceptual models indicated in the previous articles, the following conceptual models of ontologies and taxonomies have been considered for this proposal: [26], focused on asset ontologies per user; [27], focused on asset ontologies; [28], paper focused on taxonomy of impacts on assets; [29], focused on mobile asset taxonomy; [30], focused on threat taxonomy; [31], focused on taxonomy of voice over IP threats; [32], focused on attack ontology; [33], focused on attack taxonomy; [34], focused on vulnerability taxonomy; [35], focused on vulnerability taxonomy based on information attributes; [36], paper focused on vulnerability taxonomy; and [37], focused on vulnerability taxonomy.…”
Section: Contextmentioning
confidence: 99%
“…In addition, continuing with the application of the snowball technique [25] to the conceptual models indicated in the previous articles, the following conceptual models of ontologies and taxonomies have been considered for this proposal: [26], focused on asset ontologies per user; [27], focused on asset ontologies; [28], paper focused on taxonomy of impacts on assets; [29], focused on mobile asset taxonomy; [30], focused on threat taxonomy; [31], focused on taxonomy of voice over IP threats; [32], focused on attack ontology; [33], focused on attack taxonomy; [34], focused on vulnerability taxonomy; [35], focused on vulnerability taxonomy based on information attributes; [36], paper focused on vulnerability taxonomy; and [37], focused on vulnerability taxonomy.…”
Section: Contextmentioning
confidence: 99%
“…It has been claimed that 'agent-based models enable richer descriptions and analysis techniques about Internet-based environments, especially ones involving intelligent agents' [20]. We have successfully used an agent-based modelling technique [21] to analyze steganography threats in VoIP [22]. In this section, we exploit this technique to analyze the threats to the software collaborations in the cloud.…”
Section: Secondary User Threats In Collaborative Cloud Computingmentioning
confidence: 99%
“…In our modelling technique, security goals are determined by human fears, and functional goals are determined by human desires. Any goal conflict is a threat to security or functionality [22]. In any insider threat, a single person has two aliases (e.g.…”
Section: Secondary User Threats In Collaborative Cloud Computingmentioning
confidence: 99%
“…Perhaps one of the best classifications of VoIP threats is the one provided by the Voice over IP Security Alliance (VOIPSA) [1]. In 2009 a group of researchers [2] recommended to add VoIP steganography or "stegocommunication" to the list of VOIPSA taxonomy as one of the VoIP service abuse threats.…”
Section: Introductionmentioning
confidence: 99%
“…Stegocommunication is a hidden communication, in which a message is hidden in a covert channel [2]. Thus, it is impossible to recognize the existence of the concealed message in the electronic object.…”
Section: Introductionmentioning
confidence: 99%