Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records

نویسندگان

  • Uzma Anwar
  • Ghulam Shabbir
  • Malik Ahsan Ali
چکیده

Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and softwares telecommunication’s malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and proper usage. This underlined research work stresses on the analysis of IP traffic and proposes an algorithm for detection mechanisms to control and limit VoIP’s grey traffic. The algorithm emphasizes primarily on Session Initiation Protocol (SIP) but it can be modified and used for all VoIP protocols like H.323 and InterAsterisk eXchange protocol (IAX2). The suggested method is based on analyzing the pcap files. These files are used to filter VoIP traffic from network’s total IP traffic by reading the header of each packet. The algorithm then extracts different parameters for generating call logs. VoIP packets of the same call are correlated to produce a Call Detail Record (CDR). The produced CDR contains the IP addresses of source and destination that make the calls. For identification of grey traffic these IP addresses are used. If the source IP address in the CDR is of a legal registered operator the user/call is declared as legal, otherwise the user/call is illegal.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks

The threat of voice spam, commonly known as Spam over Internet Telephony (SPIT) is a real and contemporary problem. If the problem remains unchecked then it may become as potent as email spam today. In this paper, we present two approaches to detect and prevent SPITting over the Internet. Both of our approaches are based on the anomaly detection of the distributions of selected call features (i...

متن کامل

Labeled VoIP Data-Set for Intrusion Detection Evaluation

VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and infrastructures. Because of the lack of a common labeled data-set similarly to what is available in TCP/IP network-based intrusion detection, their results can not be compared. VoIP providers are not able to contribute their data...

متن کامل

Framework of Applying a Non-Homogeneous Poisson Process to Model VoIP Traffic on Tandem Networks

This paper presents a new framework for Voice over IP (VoIP) traffic modeling based on a nonhomogeneous Poisson process. The telecom industry is heading towards replacing the legacy TDM networks with an IP core network. The purpose of traffic engineering is to minimize call blocking probability and maximize resource utilization. A challenge of migrating to an IP core network is to develop an en...

متن کامل

Performance Analysis of Multi Traffic over Multi Rate EDCA of WLAN Network

Enhanced distributed channel access (EDCA) is used for transmitting good quality of service of multimedia traffic in wireless local area network (WLAN). Applications like Constant bit rate (CBR), file transfer protocol (FTP) and voice over internet protocol (VoIP) are used in wireless LAN network. Audio data is assign as high priority (AC_VO) and other such as CBR & FTP type of data are assigne...

متن کامل

On the deployment of VoIP in Ethernet networks: methodology and case study

Deploying IP telephony or voice over IP (VoIP) is a major and challenging task for data network researchers and designers. This paper outlines guidelines and a step-by-step methodology on how VoIP can be deployed successfully. The methodology can be used to assess the support and readiness of an existing network. Prior to the purchase and deployment of VoIP equipment, the methodology predicts t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014