Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records
نویسندگان
چکیده
Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and softwares telecommunication’s malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and proper usage. This underlined research work stresses on the analysis of IP traffic and proposes an algorithm for detection mechanisms to control and limit VoIP’s grey traffic. The algorithm emphasizes primarily on Session Initiation Protocol (SIP) but it can be modified and used for all VoIP protocols like H.323 and InterAsterisk eXchange protocol (IAX2). The suggested method is based on analyzing the pcap files. These files are used to filter VoIP traffic from network’s total IP traffic by reading the header of each packet. The algorithm then extracts different parameters for generating call logs. VoIP packets of the same call are correlated to produce a Call Detail Record (CDR). The produced CDR contains the IP addresses of source and destination that make the calls. For identification of grey traffic these IP addresses are used. If the source IP address in the CDR is of a legal registered operator the user/call is declared as legal, otherwise the user/call is illegal.
منابع مشابه
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks
The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i...
متن کاملLabeled VoIP Data-Set for Intrusion Detection Evaluation
VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and infrastructures. Because of the lack of a common labeled data-set similarly to what is available in TCP/IP network-based intrusion detection, their results can not be compared. VoIP providers are not able to contribute their data...
متن کاملFramework of Applying a Non-Homogeneous Poisson Process to Model VoIP Traffic on Tandem Networks
This paper presents a new framework for Voice over IP (VoIP) traffic modeling based on a nonhomogeneous Poisson process. The telecom industry is heading towards replacing the legacy TDM networks with an IP core network. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. A challenge of migrating to an IP core network is to develop an en...
متن کاملPerformance Analysis of Multi Traffic over Multi Rate EDCA of WLAN Network
Enhanced distributed channel access (EDCA) is used for transmitting good quality of service of multimedia traffic in wireless local area network (WLAN). Applications like Constant bit rate (CBR), file transfer protocol (FTP) and voice over internet protocol (VoIP) are used in wireless LAN network. Audio data is assign as high priority (AC_VO) and other such as CBR & FTP type of data are assigne...
متن کاملOn the deployment of VoIP in Ethernet networks: methodology and case study
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step methodology on how VoIP can be deployed successfully. The methodology can be used to assess the support and readiness of an existing network. Prior to the purchase and deployment of VoIP equipment, the methodology predicts t...
متن کامل