Abstract
In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahsan, K., Kundur, D.: Practical Data Hiding in TCP/IP. In: Proc. of Workshop on Multimedia Security at ACM Multimedia 2002, Juan-les-Pins, France (2002)
Bidou, R., Raynal, F.: Covert channels, http://www.radware.com/WorkArea/downloadasset.aspx?id=3928
Cuervo, F., Greene, N., Rayhan, A., Huitema, C., Rosen, B., Segers, J.: Megaco Protocol Version 1.0. IETF, RFC 3015 (2000)
Galvin, J., Murphy, S., Crocker, S., Freed, N.: Security Multiparts for MIME: Multipart/Signed and Multipart/Encrypted. IETF, RFC 1847 (1995)
Handley, M., Jacobson, V., Perkins, C.: SDP: Session Description Protocol. IETF, RFC 4566 (2006)
ITU-T Recommendation H.323: Packet-based Multimedia Communications Systems Ver. 6. ITU (2006)
Johnston, A., Donovan, S., Sparks, R., Cunningham, C., Summers, K.: Session Initiation Protocol (SIP) Basic Call Flow Examples. IETF, RFC 3665 (2003)
Kwecka, Z.: Application Layer Covert Channel Analysis and Detection. Napier University Edinburgh, Technical Report (2006), http://www.buchananweb.co.uk/zk.pdf
Lampson, B.: A Note on the Confinement Problem. Comm. ACM 16(10), 613–615 (1973)
Mazurczyk, W., Kotulski, Z.: New Security and Control Protocol for VoIP Based on Steganography and Digital Watermarking. Annales UMCS, Informatica, AI 5, 417–426 (2006) ISNN 1732-1360
Mazurczyk, W., Kotulski, Z.: New VoIP Traffic Security Scheme with Digital Watermarking. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 170–181. Springer, Heidelberg (2006)
Murdoch, S.J., Lewis, S.: Embedding Covert Channels into TCP/IP. In: Barni, M., Herrera-JoancomartÃ, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 247–261. Springer, Heidelberg (2005)
Petitcolas, F., Anderson, R., Kuhn, M.: Information Hiding – A Survey. IEEE Special Issue on Protection of Multimedia Content (1999)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.: SIP: Session Initiation Protocol. IETF, RFC 3261 (2002)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-Time Applications. IETF, RFC 3550 (2003)
US Department of Defense – Trusted Computer System Evaluation Criteria. DOD 5200.28-STD. The Orange Book (1985)
Wikipedia, http://en.wikipedia.org/wiki/Covert_channel
Zander, S., Armitage, G., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys & Tutorials, 3rd Quarter 2007 9(3), 44–57 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mazurczyk, W., Szczypiorski, K. (2008). Covert Channels in SIP for VoIP Signalling. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds) Global E-Security. ICGeS 2008. Communications in Computer and Information Science, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69403-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-69403-8_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69402-1
Online ISBN: 978-3-540-69403-8
eBook Packages: Computer ScienceComputer Science (R0)