Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 8
Year of Publication: 2014
Authors:
Uzma Anwar
Ghulam Shabbir
Malik Ahsan Ali
10.5120/15519-2724

Uzma Anwar, Ghulam Shabbir and Malik Ahsan Ali. Article: Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records. International Journal of Computer Applications 89(8):1-7, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Uzma Anwar and Ghulam Shabbir and Malik Ahsan Ali},
	title = {Article: Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {8},
	pages = {1-7},
	month = {March},
	note = {Full text available}
}

Abstract

Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and softwares telecommunication's malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and proper usage. This underlined research work stresses on the analysis of IP traffic and proposes an algorithm for detection mechanisms to control and limit VoIP's grey traffic. The algorithm emphasizes primarily on Session Initiation Protocol (SIP) but it can be modified and used for all VoIP protocols like H. 323 and Inter-Asterisk eXchange protocol (IAX2). The suggested method is based on analyzing the pcap files. These files are used to filter VoIP traffic from network's total IP traffic by reading the header of each packet. The algorithm then extracts different parameters for generating call logs. VoIP packets of the same call are correlated to produce a Call Detail Record (CDR). The produced CDR contains the IP addresses of source and destination that make the calls. For identification of grey traffic these IP addresses are used. If the source IP address in the CDR is of a legal registered operator the user/call is declared as legal, otherwise the user/call is illegal.

References

  • Article, Available: http://telecompk. net
  • Yiming Gong, Identifying P2P users using traffic analysis available: http://www. symantec. com/connect/articles/identifying-p2p-users-using-traffic-analysis
  • Kitamura tsutomu (Nec Corp. ), Shizuno takayuki (Nec Corp. ), Okabe toshiya (Nec Corp. ), Tani hideaki (Nec Corp. ), (2006) "Traffic Identification for Dependable VoIP", NEC Technical Journal, VOL. 1;NO. 3;PAGE. 17-20
  • Luca Deri, (2009), Open Source VoIP Traffic Monitoring, Available: http://luca. ntop. org/.
  • Baset, S. A. ; Schulzrinne, H. G. , (2006) "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol", in Proc. INFOCOM 2006. 25th IEEE International Conference on Computer Communications.
  • Uzma Aslam Khan, Fauzia Idrees , (2008) " A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection" IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 2
  • Kuan-Ta Chen , Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei1, (2008) "Detecting VoIP Traffic Based on Human Conversation Pattern" Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Pages 280 - 295, Springer-Verlag Berlin, Heidelberg ©2008
  • Nico d'Heureuse and Sandra Tartarelli, and Saverio Niccolini , (2010)"Lessons Learned on the Usage of Call Logs for Security and Management in IP Telephony" IEEE Communications Magazine, Volume 48 Issue 12
  • Yoseba K. Penya , Igor Ruiz-Agundez and Pablo G. Bringas, (2011)"NETWORK PLANNING OF A VOIP CAPABLE PBX" , International Conference on Data Communication Networking (DCNET) , SciTePress, Seville, Spain, pp. 85-88
  • Lin Lu, Yiwen Liang, Chao Yang,Shiwei Song, (2011) "Detecting Faults in IP-PBX with Deterministic Dendritic Cell Algorithm",Advances in Information Sciences and Service Sciences(AISS), Vol. 3, No. 11, pp. 457 ~ 465
  • Munir Cochinwala, Euthimios Panagos,(2009) "Near Real-time Call Detail Record ETL Flows" Conference on Business Intelligence for the Real-Time Enterprises - BIRTE , pp. 142-154, Telcordia Applied Research
  • Dragana ?amilovi? , Dragana Be?ejski-Vujaklija and Nataša Gospi?, (2009) "A Call Detail Records Data Mart: Data Modelling and OLAP Analysis" Journal Article ,2009, Comput. Sci. Inf. Syst 01/2009; 6:87-110
  • Stef Hofbauer, S. ; Quirchmayr, G. ; Beckers, K. , (2012) "A privacy preserving approach to Call Detail Records analysis in VoIP systems", IEEE 2012 Seventh International Conference on Availability, Reliability and Security
  • Khairul Nizam Baharim, Mohd. Shafri Kamaruddin, Faeizah Jusof, (2008) "Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis", ICOIN 2008. International Conference on Information Networking
  • Gean D. Breda, Leonardo de S. Mendes, (2006) "QoS monitoring and Failure Detection using CDRs" IEEE Telecommunications Symposium, 2006 International, 2006, Page(s): 243 - 248