Empirical tests of anonymous voice over IP
نویسندگان
چکیده
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challenging, as anonymity services can be slow and unpredictable. In this paper, we propose a method for extending onion-routing style anonymity protocols for supporting anonymous VoIP (aVoIP) traffic with reasonable performance. We report the results of extensive experimentation across 210 globally placed PlanetLab proxies which shows that paths for reasonable aVoIP quality would need to be selected carefully. Our design includes an algorithm for the measurement and selection of paths for reasonable aVoIP performance and an analysis of the potential for attackers to take advantage of this algorithm to improve existing attacks. We show that aVoIP could be developed in an onion routing system with reasonable performance guarantees and a modest increase in risk to its users as compared to the standard path selection
منابع مشابه
A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities
Unsolicited emails, more commonly known as spam, have plagued the use and efficiency of email since its inception. With the introduction of ungoverned cheap voice communications, such as IP telephony, spam over telephony (SPIT) and its prevention is set to dominate and drive whether the technology is widely adopted or not. A possible example of voice spam schemes includes the use of Interactive...
متن کاملAn Investigation into the Effects of GEO Satellite Environments upon H.323-based Voice over IP
The work presented in this report was performed within the IMMSAT project, a project carried out during Q2-Q4 2000 by Norsk Regnesentral [21] and Nera SatCom AS [23]. IMMSAT comprised both a theoretical and an empirical study of technical aspects concerning “Internet Protocol based MultiMedia Services over a Satellite Network”. Specifically, the project focussed upon technical aspects involved ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملVoice over IP - Wikipedia, the free encyclopedia
Voice over IP (VoIP) is a family of technologies, methodologies, communication protocols, and transmission techniques for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband tele...
متن کاملIntroducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 34 شماره
صفحات -
تاریخ انتشار 2011