Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
نویسندگان
چکیده
Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-onone via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of
منابع مشابه
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures ; CU-CS-1068-10
Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-onone via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat...
متن کاملOn the Privacy Protection in Information Sharing
In distributed database systems, information sharing across different parties is a common application. Almost all information sharing applications face a common threat from adversaries intending to obtain private data from the other parties. In this paper, we address privacy protection in distributed information sharing environments. In particular, we model and analyze privacy intrusion attacks...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملDetection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavi...
متن کاملA Bimodal Verification Cryptosystem as a Framework against Spoofing Attacks
The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1007.1473 شماره
صفحات -
تاریخ انتشار 2010