CFP last date
20 June 2024
Reseach Article

Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records

by Uzma Anwar, Ghulam Shabbir, Malik Ahsan Ali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 8
Year of Publication: 2014
Authors: Uzma Anwar, Ghulam Shabbir, Malik Ahsan Ali

Uzma Anwar, Ghulam Shabbir, Malik Ahsan Ali . Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records. International Journal of Computer Applications. 89, 8 ( March 2014), 1-7. DOI=10.5120/15519-2724

@article{ 10.5120/15519-2724,
author = { Uzma Anwar, Ghulam Shabbir, Malik Ahsan Ali },
title = { Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 8 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { },
doi = { 10.5120/15519-2724 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:08:40.354023+05:30
%A Uzma Anwar
%A Ghulam Shabbir
%A Malik Ahsan Ali
%T Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 8
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Voice over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and softwares telecommunication's malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and proper usage. This underlined research work stresses on the analysis of IP traffic and proposes an algorithm for detection mechanisms to control and limit VoIP's grey traffic. The algorithm emphasizes primarily on Session Initiation Protocol (SIP) but it can be modified and used for all VoIP protocols like H. 323 and Inter-Asterisk eXchange protocol (IAX2). The suggested method is based on analyzing the pcap files. These files are used to filter VoIP traffic from network's total IP traffic by reading the header of each packet. The algorithm then extracts different parameters for generating call logs. VoIP packets of the same call are correlated to produce a Call Detail Record (CDR). The produced CDR contains the IP addresses of source and destination that make the calls. For identification of grey traffic these IP addresses are used. If the source IP address in the CDR is of a legal registered operator the user/call is declared as legal, otherwise the user/call is illegal.

  1. Article, Available: http://telecompk. net
  2. Yiming Gong, Identifying P2P users using traffic analysis available: http://www. symantec. com/connect/articles/identifying-p2p-users-using-traffic-analysis
  3. Kitamura tsutomu (Nec Corp. ), Shizuno takayuki (Nec Corp. ), Okabe toshiya (Nec Corp. ), Tani hideaki (Nec Corp. ), (2006) "Traffic Identification for Dependable VoIP", NEC Technical Journal, VOL. 1;NO. 3;PAGE. 17-20
  4. Luca Deri, (2009), Open Source VoIP Traffic Monitoring, Available: http://luca. ntop. org/.
  5. Baset, S. A. ; Schulzrinne, H. G. , (2006) "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol", in Proc. INFOCOM 2006. 25th IEEE International Conference on Computer Communications.
  6. Uzma Aslam Khan, Fauzia Idrees , (2008) " A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection" IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 2
  7. Kuan-Ta Chen , Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei1, (2008) "Detecting VoIP Traffic Based on Human Conversation Pattern" Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Pages 280 - 295, Springer-Verlag Berlin, Heidelberg ©2008
  8. Nico d'Heureuse and Sandra Tartarelli, and Saverio Niccolini , (2010)"Lessons Learned on the Usage of Call Logs for Security and Management in IP Telephony" IEEE Communications Magazine, Volume 48 Issue 12
  9. Yoseba K. Penya , Igor Ruiz-Agundez and Pablo G. Bringas, (2011)"NETWORK PLANNING OF A VOIP CAPABLE PBX" , International Conference on Data Communication Networking (DCNET) , SciTePress, Seville, Spain, pp. 85-88
  10. Lin Lu, Yiwen Liang, Chao Yang,Shiwei Song, (2011) "Detecting Faults in IP-PBX with Deterministic Dendritic Cell Algorithm",Advances in Information Sciences and Service Sciences(AISS), Vol. 3, No. 11, pp. 457 ~ 465
  11. Munir Cochinwala, Euthimios Panagos,(2009) "Near Real-time Call Detail Record ETL Flows" Conference on Business Intelligence for the Real-Time Enterprises - BIRTE , pp. 142-154, Telcordia Applied Research
  12. Dragana ?amilovi? , Dragana Be?ejski-Vujaklija and Nataša Gospi?, (2009) "A Call Detail Records Data Mart: Data Modelling and OLAP Analysis" Journal Article ,2009, Comput. Sci. Inf. Syst 01/2009; 6:87-110
  13. Stef Hofbauer, S. ; Quirchmayr, G. ; Beckers, K. , (2012) "A privacy preserving approach to Call Detail Records analysis in VoIP systems", IEEE 2012 Seventh International Conference on Availability, Reliability and Security
  14. Khairul Nizam Baharim, Mohd. Shafri Kamaruddin, Faeizah Jusof, (2008) "Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis", ICOIN 2008. International Conference on Information Networking
  15. Gean D. Breda, Leonardo de S. Mendes, (2006) "QoS monitoring and Failure Detection using CDRs" IEEE Telecommunications Symposium, 2006 International, 2006, Page(s): 243 - 248
Index Terms

Computer Science
Information Sciences


Inter-Asterisk eXchange protocol (IAX) Internet Protocol (IP) Session Initiation Protocol (SIP) VoIP-Voice over IP (VoIP) Call Detail Record (CDRs)