Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

M. Mazhar U. Rathore1
1School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan

Tài liệu tham khảo

Adami, D., Callegari, C., Giordano, S., Pagano, M., Pepe, T., 2009. A real-time algorithm for skype traffic detection and classification. In: 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and 2nd Conference on Smart Spaces, Postersburg, Russia. Alshammari, Riyad, Zincir-Heywood, A. Nur, 2010. An investigation on the identification of VoIP traffic: case study on Gtalk and Skype. In: 2010 International Conference on Network and Service Management (CNSM), Niagara Falls, Canada, pp. 310–313. Alshammari, 2011, Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?, Elsevier Comput. Netw., 55, 1326, 10.1016/j.comnet.2010.12.002 Baset, Salman A., Schulzrinne, Henning, 2006. An analysis of the skype peer-to-peer internet telephony protocol, INFOCOM 2006. In: 25th International Conference on Computer Communication, Barcelona, Spain, pp. 1–11. Birke, 2010, Experiences of VoIP traffic monitoring in a commercial ISP, Int. J. Netw. Manage., 20, 339, 10.1002/nem.758 Bonfiglio, Dario, Mellia, Marco, Meo, Michela, Ritacca, Nicol‘o, Rossi, Dario, 2008. Tracking down skype traffic, INFOCOM 2008. In: 27th IEEE International Conference on Computer Communication, Phoenix, Arizona, USA, pp. 261–265. Branch, P., But, J., 2012. Rapid and generalized identification of packetized voice traffic flows. In: 37th IEEE Conference on Local Computer Networks (LCN12), Clearwater, Florida. Dusi, 2009, Tunnel hunter: detecting application-layer tunnels with statistical fingerprinting, Elsevier Comput. Netw., 53, 81, 10.1016/j.comnet.2008.09.010 Freire, Emanuel P., Ziviani, Artur, Salles, Ronaldo M., 2008. Detecting VoIP calls hidden in web traffic. In: IEEE Transaction on Network and Service Management, vol no. 5, pp. 210–214. <http://tstat.tlc.polito.it/traces-skype.shtml>. <http://wiki.wireshark.org/SampleCaptures>. Idrees, Fauzia, Aslam Khan, Uzma, 2008. A generic technique for Voice over Internet Protocol (VoIP) traffic detection. In: IJCSNS International Journal of Computer Science and Network Security, vol.8 no. 2, pp. 52–59. Leung, Chun-Ming, Chan, Yuen-Yan, 2007. Network forensic on encrypted peer to-peer VoIP traffics and the detection, blocking, and prioritization of skype traffics. In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Paris, France, pp. 401–408. Li, Jun, Zhang, Shunyi, Liu, Shidong, Xuan, Ye, 2007. Active P2P traffic identification technique. In: 2007 International Conference on Computational Intelligence and Security, Harbin, China, pp. 37–41. Li, 2010, VoIP traffic identification based on host and flow behavior analysis, J. Netw. Syst. Manage., 19 Li, Bing, Jin, Shigang, Ma, Moade, 2010. VoIP traffic identification based on host and flow behavior analysis. In: 2010 International Conference on Wireless Communication Networking and Mobile Computing (WICOM), Chengdu, China, pp 1–4. Lin, 2009, Application classification using packet size distribution and port association, Elsevier: J. Netw. Comput. Appl., vol. 32, 1023 Lu, Feng, Liu, Xiao-Lei, Zhi-Nan, M.A., 2010. Research on the characteristics and blocking realization of Skype protocol. In: 2010 IEEE International Conference on Electrical and Control Engineering (ICECE), Wuhan, China, pp. 2964–2967. Maiolini, 2009, On the fly application flows identification by exploiting K-means based classifiers, J. Inf. Assur. Security, 4, 142 Nguyen, Thuy T.T., Armitage, Grenville, 2008. Clustering to assist supervised machine learning for real-time IP traffic classification. In: IEEE International Conference on Communication, Beijing, China, pp. 5857–5862. Okabe, T., Kitamura, T., Shizuno, T., 2006. Statistical traffic identification method based on flow-level behavior for fair VoIP service. In: Proceedings of IEEE Workshop on VoIP Management and Security, pp. 35–40. Peranyi, M., Molnar, S., 2007. Enhanced Skype traffic identification. In: ValueTools, Proceedings of the 2nd International Conference on Performance Evaluation Methodologies and Tools, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, pp. 1–9. Rathore, M.M.U., Mehmood, T., 2012. Research on VoIP traffic detection. In: 2012 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2012, Genoa, Italy. Renals, P., Jacoby, G.A., 2009. Blocking Skype through deep packet inspection. In: The 42nd Annual Hawaii International Conference on System Sciences, HICSS’09, Big Island, HI, pp. 2009. Rossi, Dario, Mellia, Marco, Meo, Michela, 2008. A detailed measurement of skype network traffic. In: Proceedings of the 7th International Conference on Peer-to-Peer Systems, USENIX Association. Yildirim, Taner, Radcliffe, P.J., 2010. VoIP traffic classification in IPSec tunnels. In: 2010 International Conference on Electronics and Information Engineering (ICEIE), Koyoto, Japan, vol. 1, pp. VI-151-VI-157. Yildirim, Taner, Radcliffe, P.J., 2010. A framework for tunneled traffic analysis. In: 12th International Conference on Advance Communication Technology (ICACT), Phoenix Park, Korea, vol 2, pp. 1029–1034.