M. Rathore, Anand Paul, Awais Ahmad, M. Imran, M. Guizani
{"title":"高速网络流量分析:检测安全大数据流中的VoIP呼叫","authors":"M. Rathore, Anand Paul, Awais Ahmad, M. Imran, M. Guizani","doi":"10.1109/LCN.2016.128","DOIUrl":null,"url":null,"abstract":"Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls either to block illegal commercial VoIP or prioritize the paid users VoIP calls. Signature-based, port-based, and pattern-based VoIP detection techniques are not more accurate and not efficient due to complex security and tunneling mechanisms used by VoIP. Therefore, in this paper, we propose a rule-based generic, robust, and efficient statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice) flows using threshold approach. In addition, a system is proposed to efficiently process high-speed real-time network traffic. The accuracy and efficiency evaluation results and the comparative study show that the proposed system outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.","PeriodicalId":6864,"journal":{"name":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","volume":"6 1","pages":"595-598"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming\",\"authors\":\"M. Rathore, Anand Paul, Awais Ahmad, M. Imran, M. Guizani\",\"doi\":\"10.1109/LCN.2016.128\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls either to block illegal commercial VoIP or prioritize the paid users VoIP calls. Signature-based, port-based, and pattern-based VoIP detection techniques are not more accurate and not efficient due to complex security and tunneling mechanisms used by VoIP. Therefore, in this paper, we propose a rule-based generic, robust, and efficient statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice) flows using threshold approach. In addition, a system is proposed to efficiently process high-speed real-time network traffic. The accuracy and efficiency evaluation results and the comparative study show that the proposed system outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.\",\"PeriodicalId\":6864,\"journal\":{\"name\":\"2016 IEEE 41st Conference on Local Computer Networks (LCN)\",\"volume\":\"6 1\",\"pages\":\"595-598\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 41st Conference on Local Computer Networks (LCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2016.128\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 41st Conference on Local Computer Networks (LCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2016.128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming
Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls either to block illegal commercial VoIP or prioritize the paid users VoIP calls. Signature-based, port-based, and pattern-based VoIP detection techniques are not more accurate and not efficient due to complex security and tunneling mechanisms used by VoIP. Therefore, in this paper, we propose a rule-based generic, robust, and efficient statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice) flows using threshold approach. In addition, a system is proposed to efficiently process high-speed real-time network traffic. The accuracy and efficiency evaluation results and the comparative study show that the proposed system outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.