Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

作者: M. Mazhar U. Rathore

DOI: 10.1016/J.JKSUCI.2014.06.016

关键词:

摘要: VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and compatibility with public switched (PSTN). In some countries, like Pakistan, commercial of prohibited. Internet service providers (ISPs) telecommunication authorities are interested in detecting calls either block or prioritize them. So detection important for both types authorities. Signature-based, port-based, pattern-based techniques inefficient complex confidential security tunneling mechanisms used by VoIP. this paper, we propose a generic, robust, efficient, practically implementable statistical analysis-based solution identify encrypted, non-encrypted, tunneled media (voice) flows using threshold values flow parameters. We have made comparison existing evaluated our system respect accuracy efficiency. Our has 97.54% direct rate .00015% false positive rate.

参考文章(27)
D. Adami, C. Callegari, S. Giordano, M. Pagano, T. Pepe, A Real-Time Algorithm for Skype Traffic Detection and Classification NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces. ,vol. 5764, pp. 168- 179 ,(2009) , 10.1007/978-3-642-04190-7_16
Marco Mellia, Dario Rossi, Michela Meo, A detailed measurement of skype network traffic international workshop on peer to peer systems. pp. 12- 12 ,(2008)
Muhammad Mazhar Ullah Rathore, Tahir Mehmood, None, Research on VoIP traffic detection international symposium on performance evaluation of computer and telecommunication systems. pp. 1- 5 ,(2012)
Riyad Alshammari, A. Nur Zincir-Heywood, Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? Computer Networks. ,vol. 55, pp. 1326- 1350 ,(2011) , 10.1016/J.COMNET.2010.12.002
Philip Branch, Jason But, Rapid and generalized identification of packetized voice traffic flows local computer networks. pp. 85- 92 ,(2012) , 10.1109/LCN.2012.6423690
Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng, Po-Ching Lin, Review: Application classification using packet size distribution and port association Journal of Network and Computer Applications. ,vol. 32, pp. 1023- 1030 ,(2009) , 10.1016/J.JNCA.2009.03.001
Bing Li, Zhigang Jin, Maode Ma, VoIP Traffic Identification Based on Host and Flow Behavior Analysis international conference on wireless communications, networking and mobile computing. pp. 1- 4 ,(2010) , 10.1109/WICOM.2010.5601444
Taner Yildirim, PJ Radcliffe, VoIP traffic classification in IPSec tunnels international conference on electronics and information engineering. ,vol. 1, pp. 151- 157 ,(2010) , 10.1109/ICEIE.2010.5559900
Bing Li, Maode Ma, Zhigang Jin, A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis Journal of Network and Systems Management. ,vol. 19, pp. 111- 129 ,(2011) , 10.1007/S10922-010-9184-7
Su Hongsheng, Zhao Feng, P2P Traffic Identification Technique computational intelligence and security. pp. 37- 41 ,(2007) , 10.1109/CIS.2007.178