Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3563647.3563649acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Mass surveillance of VoIP calls in the data plane

Published: 19 October 2022 Publication History

Abstract

Over the last decade, programmable data planes have enabled highly customizable and efficient packet processing in commercial off-the-shelf hardware. Although researchers have demonstrated various use cases of this technology, its potential misuse has gained much less traction. This work investigates a typical surveillance scenario, VoIP call identification and monitoring, through a tailored data-plane attack.
We introduce DELTA, a network-level side-channel attack that can efficiently identify VoIP calls and their hosting services. DELTA achieves this by tracking the inherent network footprint of VoIP services in the data plane. Specifically, DELTA stores the user addresses recently connected to VoIP services and links potential call flows with these addresses.
We implement DELTA on existing hardware and conduct high-throughput tests based on representative traffic. DELTA can simultaneously store around 100 000 VoIP connections per service and identify call streams in-path, at line-rate, inside terabits of Internet traffic per second, immediately revealing users' communication patterns.

References

[1]
2022. Cisco-System-Traffic-Generator/Trex-Core. Cisco Systems Traffic Generators. https://github.com/cisco-system-traffic-generator/trex-core
[2]
BBC . 2016. Turkey Coup Accused 'Traced via Messaging App'. BBC News (Aug. 2016). https://www.bbc.com/news/technology-36976693
[3]
CAIDA . 2018. The CAIDA Anonymized Internet Traces Dataset (April 2008 - January 2019). https://www.caida.org/catalog/datasets/passive_dataset/
[4]
Documentation . 2022. AWS IP Address Ranges - AWS General Reference. https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html
[5]
AccessNow. 2022. U.S.-Canadian Firm Sandvine Fosters Russian Censorship Infrastructure. https://www.accessnow.org/sandvine-russian-censorship/
[6]
AlJazeera. 2018. Iran Releases Messaging App to Replace Telegram. https://www.aljazeera.com/news/2018/4/26/iran-releases-messaging-app-soroush-to-replace-telegram
[7]
AMS-IX. 2022. AMS-IX Amsterdam. https://www.ams-ix.net/ams
[8]
AMS-IX. 2022. Total Stats | AMS-IX Amsterdam. https://www.ams-ix.net/ams/documentation/total-stats
[9]
Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 551--569. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/angel
[10]
Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever. 2019. SABRE: Protecting Bitcoin against Routing Attacks. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. The Internet Society. https://www.ndss-symposium.org/ndss-paper/sabre-protecting-bitcoin-against-routing-attacks/
[11]
Netberg Aurora. 2022. Netberg Aurora 750 100G BM Switch Preloaded with ONIE. https://bm-switch.com/index.php/netberg-aurora750-100g-bms.html
[12]
Microsoft Azure. 2021. Scaling Secure Enclave Environments with Signal and Azure Confidential Computing. https://customers.microsoft.com/en-us/story/1374464612401582154-signal-nonprofit-azure-security
[13]
Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, and Don Towsley. 2020. Practical Traffic Analysis Attacks on Secure Messaging Applications. In Proceedings 2020 Network and Distributed System Security Symposium. Internet Society, San Diego, CA.
[14]
Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando MV Ramos, and André Madeira. 2021. FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. In NDSS.
[15]
Pat Bosshart, Dan Daly, Glen Gibb, Martin Izzard, Nick McKeown, Jennifer Rexford, Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, and David Walker. 2014. P4: Programming Protocol-Independent Packet Processors. SIGCOMM Comput. Commun. Rev. 44, 3 (July 2014), 87--95.
[16]
Pat Bosshart, Glen Gibb, Hun-Seok Kim, George Varghese, Nick McKeown, Martin Izzard, Fernando Mujica, and Mark Horowitz. 2013. Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13). Association for Computing Machinery, New York, NY, USA, 99--110.
[17]
Yérom-David Bromberg, Quentin Dufour, Davide Frey, and Étienne Rivière. 2022. Donar: Anonymous VoIP over Tor. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 249--265. https://www.usenix.org/conference/nsdi22/presentation/bromberg
[18]
Sean Buckley. 2017. Google Cloud, Barefoot Networks Create P4 Runtime Open Source Project. https://www.fiercetelecom.com/telecom/google-cloud-barefoot-networks-create-p4-runtime-open-source-project
[19]
Coralie Busse-Grawitz, Roland Meier, Alexander Dietmüller, Tobias Bühler, and Laurent Vanbever. 2019. pForest: In-Network Inference with Random Forests. arXiv:1909.05680 [cs]
[20]
CAIDA. 2018. Passive Monitor: Equinix-Chicago. https://www.caida.org/catalog/datasets/monitors/passive-equinix-chicago/
[21]
CAIDA. 2018. Passive Monitor: Equinix-Nyc. https://www.caida.org/catalog/datasets/monitors/passive-equinix-nyc/
[22]
CAIDA. 2018. Trace Statistics for CAIDA Passive OC48 and OC192 Traces. https://www.caida.org/catalog/datasets/trace_stats/
[23]
Amarnath Chakraborty. 2021. How to Always Relay Calls to Hide IP Address in Signal. https://techviral.net/signal-always-relay-calls/
[24]
F. Chang, Wu-chang Feng, and Kang Li. 2004. Approximate Caches for Packet Classification. In IEEE INFOCOM 2004, Vol. 4. 2196--2207 vol.4.
[25]
Shiping Chen, Xinyuan Wang, and S. Jajodia. 2006. On the Anonymity and Traceability of Peer-to-Peer VoIP Calls. IEEE Network 20, 5 (2006), 32--37.
[26]
Selina Cheng. 2021. Hongkongers Quit WhatsApp and Flock to Signal as Privacy Watchdog Seeks Extra Time for Users to Decide on New Terms. https://hongkongfp.com/2021/01/12/hongkongers-quit-whatsapp-and-flock-to-signal-as-privacy-watchdog-seeks-extra-time-for-users-to-decide-on-new-terms/
[27]
Cisco. 2001. Quality of Service for Voice over IP. https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoIP.html
[28]
Baris Coskun and Nasir Memon. 2010. Tracking Encrypted VoIP Calls via Robust Hashing of Network Flows. In 2010 IEEE International Conference on Acoustics, Speech and Signal Processing. 1818--1821.
[29]
Trisha Datta, Nick Feamster, Jennifer Rexford, and Liang Wang. 2019. SPINE: Surveillance Protection in the Network Elements. In 9th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2019, Santa Clara, CA, USA, August 13, 2019, Susan E. McGregor and Michael Carl Tschantz (Eds.). USENIX Association. https://www.usenix.org/conference/foci19/presentation/datta
[30]
Ryan Devereaux and Glenn Greenwald. 2014. The NSA Is Recording Every Cell Phone Call in the Bahamas. https://theintercept.com/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/
[31]
Mario Di Mauro and Maurizio Longo. 2014. Skype Traffic Detection: A Decision Theory Based Tool. In 2014 International Carnahan Conference on Security Technology (ICCST). 1--6.
[32]
Mario Di Mauro and Maurizio Longo. 2015. Revealing Encrypted WebRTC Traffic via Machine Learning Tools. In 2015 12th International Joint Conference on E-Business and Telecommunications (ICETE), Vol. 04. 259--266.
[33]
Donald E. Eastlake 3rd. 2011. Transport Layer Security (TLS) Extensions: Extension Definitions. Request for Comments RFC 6066. Internet Engineering Task Force.
[34]
Facebook. 2022. Set Up and Debug Your Network - WhatsApp Business On-Premises API - Documentation. https://developers.facebook.com/docs/whatsapp/guides/network-requirements/
[35]
Ryan Gallagher. 2020. Sandvine's Technology Used for Web Censoring in More Than a Dozen Nations. https://financialpost.com/pmn/business-pmn/sandvines-technology-used-for-web-censoring-in-more-than-a-dozen-nations
[36]
Ryan Gallagher. 2020. U.S. Company Faces Backlash After Belarus Uses Its Tech to Block Internet. Bloomberg.com (Sept. 2020). https://www.bloomberg.com/news/articles/2020-09-11/sandvine-use-to-block-belarus-internet-rankles-staff-lawmakers
[37]
Van Gegel. 2022. TORFone: Secure VoIP Tool. http://torfone.org/
[38]
Albert Gran Alcoz, Martin Strohmeier, Vincent Lenders, and Laurent Vanbever. 2022. Aggregate-Based Congestion Control for Pulse-Wave DDoS Defense. In ACM SIGCOMM. Amsterdam, The Netherlands.
[39]
Glenn Greenwald. 2013. NSA Collecting Phone Records of Millions of Verizon Customers Daily. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
[40]
Glenn Greenwald and Ewen MacAskill. 2013. NSA Prism Program Taps in to User Data of Apple, Google and Others. https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
[41]
Project Guardian. 2022. Orbot: Proxy with Tor. https://guardianproject.info/apps/org.torproject.android/
[42]
Vladimir Gurevich and Andy Fingerhut. 2021. P416 Programming for Intel® Tofino™ Using Intel P4 Studio™.
[43]
Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, and Patrick Traynor. 2017. Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017, 1 (2017), 170--187.
[44]
Theo Jepsen, Daniel Alvarez, Nate Foster, Changhoon Kim, Jeongkeun Lee, Masoud Moshref, and Robert Soulé. 2019. Fast String Searching on PISA. In Proceedings of the 2019 ACM Symposium on SDN Research (SOSR '19). Association for Computing Machinery, New York, NY, USA, 21--28.
[45]
Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, and Xiapu Luo. 2020. Programmable In-Network Security for Context-Aware BYOD Policies. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 595--612. https://www.usenix.org/conference/usenixsecurity20/presentation/kang
[46]
Anthony Wing Kosner. 2012. Will Microsoft's Changes To The Architecture Of Skype Make It Easier To Snoop? https://www.forbes.com/sites/anthonykosner/2012/07/18/did-microsoft-change-the-architecture-of-skype-to-make-it-easier-to-snoop/
[47]
David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2018. Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 711--725. https://www.usenix.org/conference/osdi18/presentation/lazar
[48]
David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2019. Yodel: Strong Metadata Security for Voice Calls. In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP '19). Association for Computing Machinery, New York, NY, USA, 211--224.
[49]
Stevens Le Blond, David Choffnes, William Caldwell, Peter Druschel, and Nicholas Merritt. 2015. Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15). Association for Computing Machinery, New York, NY, USA, 639--652.
[50]
Jong-Hyouk Lee and Kamal Singh. 2020. SwitchTree: In-Network Computing and Traffic Analyses with Random Forests. Neural Computing and Applications (Nov. 2020).
[51]
Dahlia Lithwick and Steve Vladeck. 2013. Taking the "Meh" out of Metadata. https://slate.com/news-and-politics/2013/11/nsa-and-metadata-how-the-government-can-spy-on-your-health-political-beliefs-and-religious-practices.html
[52]
Yuanchao Lu and Ye Zhu. 2010. Correlation-Based Traffic Analysis on Encrypted VoIP Traffic. In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Vol. 2. 45--48.
[53]
Moxie Marlinspike. 2017. Video Calls for Signal out of Beta. https://signal.org/blog/signal-video-calls/
[54]
Philip Matthews, Jonathan Rosenberg, and Rohan Mahy. 2010. Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN). Request for Comments RFC 5766. Internet Engineering Task Force.
[55]
Roland Meier, Vincent Lenders, and Laurent Vanbever. 2022. Ditto: WAN Traffic Obfuscation at Line Rate. In NDSS Symposium 2022.
[56]
Andrew W. Moore and Denis Zuev. 2005. Internet Traffic Classification Using Bayesian Analysis Techniques. In Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '05). Association for Computing Machinery, New York, NY, USA, 50--60.
[57]
Mark Moore. 2020. China Reportedly Using Mobile Networks to Monitor US Users Abroad. https://nypost.com/2020/12/15/china-using-mobile-networks-to-monitor-us-users-abroad-report/
[58]
Tejas Nair. 2022. Is It Illegal to Use Tor Browser in 2022? https://cyberwaters.com/is-tor-illegal/
[59]
Thuy T. T. Nguyen, Grenville Armitage, Philip Branch, and Sebastian Zander. 2012. Timely and Continuous Machine-Learning-Based Classification for Interactive IP Traffic. IEEE/ACM Transactions on Networking 20, 6 (2012), 1880--1894.
[60]
Amelia Nierenberg. 2020. Signal Downloads Are Way Up Since the Protests Began. The New York Times (June 2020). https://www.nytimes.com/2020/06/11/style/signal-messaging-app-encryption-protests.html
[61]
Ed O'Keefe. 2013. Transcript: Dianne Feinstein, Saxby Chambliss Explain, Defend NSA Phone Records Program. https://www.washingtonpost.com/news/post-politics/wp/2013/06/06/transcript-dianne-feinstein-saxby-chambliss-explain-defend-nsa-phone-records-program/
[62]
Eva Papadogiannaki and Sotiris Ioannidis. 2021. A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures. Acm Computing Surveys 54, 6, Article 123 (July 2021).
[63]
Sarah Perez. 2016. WhatsApp Hits 100 Million Calls per Day. https://social.techcrunch.com/2016/06/24/whatsapp-hits-100-million-calls-per-day/
[64]
Billy Perrigo. 2020. The Inside Story of How Signal Became the Private Messaging App for an Age of Fear and Distrust. https://time.com/5893114/signal-app-privacy/
[65]
Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The Loopix Anonymity System. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, USA, 1199--1216.
[66]
Gokul Prabhakar, Rajeev Rastogi, and Marina Thottan. 2005. Oss Architecture and Requirements for VoIP Networks. Bell Labs Technical Journal 10, 1 (2005), 31--45.
[67]
AS Rank. 2022. AS Rank: AS62041 (Telegram Messenger Inc). https://asrank.caida.org/asns/62041
[68]
Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. Request for Comments RFC 8446. Internet Engineering Task Force.
[69]
Eric Rescorla, Kazuho Oku, Nick Sullivan, and Christopher A. Wood. 2022. TLS Encrypted Client Hello. Internet Draft draft-ietf-tls-esni-14. Internet Engineering Task Force. https://datatracker.ietf.org/doc/draft-ietf-tls-esni
[70]
Reuters. 2020. NSA Surveillance Exposed by Snowden Was Illegal, Court Rules Seven Years On. The Guardian (Sept. 2020). https://www.theguardian.com/us-news/2020/sep/03/edward-snowden-nsa-surveillance-guardian-court-rules
[71]
Adi Robertson. 2013. Phone Spying and PRISM Internet Surveillance: What's the Difference? https://www.theverge.com/2013/6/7/4407782/phone-spying-and-prism-internet-surveillance-whats-the-difference
[72]
Ola Salman, Imad H. Elhajj, Ayman Kayssi, and Ali Chehab. 2020. A Review on Machine Learning-Based Approaches for Internet Traffic Classification. Annals of Telecommunications 75, 11 (Dec. 2020), 673--710.
[73]
Sandvine. 2022. Advanced Traffic Classification. https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2020/Whitepapers/Sandvine_WP_Advanced%20Traffic%20Classification.pdf
[74]
Sandvine. 2022. Deploying Virtualized DPI at Multi-Tbps Scale. https://www.sandvine.com/hubfs/downloads/technology/virtualization/sandvine-wp-deploying-multi-tbps-virtualization.pdf
[75]
Sandvine. 2022. Intelligent Traffic Management | Sandvine. https://www.sandvine.com/enterprise/intelligent-traffic-management
[76]
David Schatz, Michael Rossberg, and Guenter Schaefer. 2017. Reducing Call Blocking Rates for Anonymous Voice over IP Communications. In 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 382--390.
[77]
Zane Schwartz. 2020. Sandvine's Technology Used to Censor the Internet in over a Dozen Countries. https://thelogic.co/briefing/sandvines-technology-used-to-censor-the-internet-in-over-a-dozen-countries/
[78]
Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, and Sambuddho Chakravarty. 2020. The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. Proceedings on Privacy Enhancing Technologies 2020, 4 (Oct. 2020), 69--88.
[79]
Timothy Shim. 2021. Are VPNs Legal? 10 Countries That Ban the Usage of VPN. https://www.webhostingsecretrevealed.net/blog/security/are-vpns-legal/
[80]
Guardian Staff. 2014. Russia's Eavesdropping on Phone Calls Examined by Strasbourg Court. https://www.theguardian.com/world/2014/sep/24/strasbourg-court-human-rights-russia-eavesdropping-texts-emails-fsb-
[81]
Steve Stecklow. 2012. Special Report: Chinese Firm Helps Iran Spy on Citizens. https://www.reuters.com/article/us-iran-telecoms-idUSBRE82L0B820120322
[82]
Guanglu Sun, Lili Liang, Teng Chen, Feng Xiao, and Fei Lang. 2018. Network Traffic Classification Based on Transfer Learning. Computers & Electrical Engineering 69 (July 2018), 920--927.
[83]
Signal Support. 2022. How Do I Know My Communication Is Private? https://support.signal.org/hc/en-us/articles/360007318911-How-do-I-know-my-communication-is-private-
[84]
Telegram Support. 2022. End-to-End Encrypted Voice Calls. https://core.telegram.org/api/end-to-end/voice-calls
[85]
WhatsApp Support. 2022. WhatsApp Help Center - About End-to-End Encryption. https://faq.whatsapp.com/general/security-and-privacy/end-to-end-encryption/?lang=en
[86]
Telegram Team. 2017. Voice Calls: Secure, Crystal-Clear, AI-Powered. https://telegram.org/blog/calls
[87]
Rahul Tripathi. 2016. Dangerous Signal: This Encrypted App Is Helping ISIS Members in India to Communicate - ET Telecom. http://telecom.economictimes.indiatimes.com/news/dangerous-signal-this-encrypted-app-is-helping-isis-members-in-india-to-communicate/51774226
[88]
Kelley Vice, Priya Rackshith, and Cern McAtee. 2022. Office 365 URLs and IP Address Ranges - Microsoft 365 Enterprise. https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges
[89]
Sarah Wagner. 2021. APS Networks® Launches Three TIP OpenBNG Programmable Switches to Boost the Disaggregated Telco Broadband Market - APS Networks. https://www.aps-networks.com/press/aps-networks-launches-three-tip-openbng-programmable-switches/
[90]
Xinyuan Wang, Shiping Chen, and Sushil Jajodia. 2005. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS '05). Association for Computing Machinery, New York, NY, USA, 81--91.
[91]
Big Brother Watch Team. 2021. UK Mass Surveillance Found Unlawful by Europe's Highest Human Rights Court --- Big Brother Watch. https://bigbrotherwatch.org.uk/2021/05/uk-mass-surveillance-found-unlawful-by-europes-highest-human-rights-court/
[92]
Nigel Williams, Sebastian Zander, and Grenville Armitage. 2006. A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Comput. Commun. Rev. 36, 5 (Oct. 2006), 5--16.
[93]
David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, and Aaron Johnson. 2012. Dissent in Numbers: Making Strong Anonymity Scale. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). USENIX Association, Hollywood, CA, 179--182. https://www.usenix.org/conference/osdi12/technical-sessions/presentation/wolinsky
[94]
Zhaoqi Xiong and Noa Zilberman. 2019. Do Switches Dream of Machine Learning? Toward in-Network Classification. In Proceedings of the 18th ACM Workshop on Hot Topics in Networks (HotNets '19). Association for Computing Machinery, New York, NY, USA, 25--33.
[95]
Diwen Xue, Reethika Ramesh, Valdik S S, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, and Roya Ensafi. 2021. Throttling Twitter: An Emerging Censorship Technique in Russia. In Proceedings of the 21st ACM Internet Measurement Conference (IMC '21). Association for Computing Machinery, New York, NY, USA, 435--443.
[96]
Maria Xynou and Arturo Filastò. 2021. How Countries Attempt to Block Signal Private Messenger App around the World. https://ooni.org/post/2021-how-signal-private-messenger-blocked-around-the-world/
[97]
Jing Yang. 2020. WeChat Becomes a Powerful Surveillance Tool Everywhere in China. https://www.wsj.com/articles/wechat-becomes-a-powerful-surveillance-tool-everywhere-in-china-11608633003
[98]
Wujian Ye and Kyungsan Cho. 2014. Hybrid P2P Traffic Classification with Heuristic Rules and Machine Learning. Soft Computing 18, 9 (Sept. 2014), 1815--1827.
[99]
Ge Zhang and Stefan Berthold. 2010. Hidden VoIP Calling Records from Networking Intermediaries. In Principles, Systems and Applications of IP Telecommunications (IPTComm '10). Association for Computing Machinery, New York, NY, USA, 12--21.
[100]
Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu. 2015. Robust Network Traffic Classification. IEEE/ACM Transactions on Networking 23, 4 (2015), 1257--1270.
[101]
Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qianqian Li, Mingwei Xu, and Jianping Wu. 2020. Poseidon: Mitigating Volumetric Ddos Attacks with Programmable Switches. In The 27th Network and Distributed System Security Symposium (NDSS 2020).

Cited By

View all
  • (2023)Towards Integrating Formal Methods into ML-Based Systems for NetworkingProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628188(48-55)Online publication date: 28-Nov-2023

Index Terms

  1. Mass surveillance of VoIP calls in the data plane

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SOSR '22: Proceedings of the Symposium on SDN Research
    October 2022
    101 pages
    ISBN:9781450398923
    DOI:10.1145/3563647
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. VoIP
    2. in-network monitoring
    3. internet surveillance

    Qualifiers

    • Research-article

    Conference

    SOSR '22
    Sponsor:
    SOSR '22: The ACM SIGCOMM Symposium on SDN Research
    October 19 - 20, 2022
    Virtual Event

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)36
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Towards Integrating Formal Methods into ML-Based Systems for NetworkingProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628188(48-55)Online publication date: 28-Nov-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media