Steganography meets VoIP in hacker world

Steganography meets VoIP in hacker world - Steganography...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Steganography meets VoIP in hacker world Tim Greene September 11, 2009 (Network World) Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within Voice-over-IP (VoIP) traffic. (A brief history of steganography) Techniques that fall under the category of VoIP steganography have been discussed in academic circles for a few years, but now more chatter is coming from the hacker community about creating easy-to-use tools, says Chet Hosmer, co-founder and Chief Scientist at WetStone Technologies, which researches cybercrime technology and trains security professionals investigating cybercrimes. “There are no mass-market programs yet, but it’s on our radar, and we are concerned about it given the ubiquitous nature of VoIP,” he says. VoIP steganography conceals secret messages within VoIP streams without severely degrading the quality of calls. Steganography in general is hiding messages so no one even suspects they are there, and when done digitally, it calls for hiding messages within apparently legitimate traffic. For example, secret data can be transferred within .jpg files by using the least significant bits to carry it. Because only the least significant bits are used, the hidden messages have little impact on the appearance of the images the files contain. There are more than 1,000 steganographic programs available for download online that can place secret data within image, sound and text files, Hosmer says, and then extract it. There are none for VoIP steganography yet, but in the labs, researchers have come up with three basic ways to carry it out. The first calls for using unused bits within UDP or RTP protocols – both used for VoIP - for carrying the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 12/05/2009.

Page1 / 2

Steganography meets VoIP in hacker world - Steganography...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online