network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection system by manipulating the VoIP streams through padding and shifting operations, so as to conceal them amidst the Internet traffic. A defender (the detection system) wants to detect the manipulated VoIP streams. Tackling this problem from an adversarial perspective, we provide two contributions: i) we obtain a highly stylized representation of VoIP streams in terms of transmission frequency F mathcal and payload L, and characterize the (F, L) region achievable by the attacker's transformation; ii) we formulate the VoIP detection game, and find both theoretical conditions as well as a practical algorithm to find the Nash equilibrium of the game. Simulations over real network traces, and comparison with standard, adversary-unaware tools, show the advantages of the adopted adversarial perspective.

Adversarial Detection of Concealed VoIP Traffic

Addesso P.;Cirillo M.;Di Mauro M.;Longo M.;Matta V.
2019

Abstract

network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection system by manipulating the VoIP streams through padding and shifting operations, so as to conceal them amidst the Internet traffic. A defender (the detection system) wants to detect the manipulated VoIP streams. Tackling this problem from an adversarial perspective, we provide two contributions: i) we obtain a highly stylized representation of VoIP streams in terms of transmission frequency F mathcal and payload L, and characterize the (F, L) region achievable by the attacker's transformation; ii) we formulate the VoIP detection game, and find both theoretical conditions as well as a practical algorithm to find the Nash equilibrium of the game. Simulations over real network traces, and comparison with standard, adversary-unaware tools, show the advantages of the adopted adversarial perspective.
978-1-5386-9223-3
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11386/4740486
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact