An empirical approach towards characterization of encrypted and unencrypted VoIP traffic

被引:0
|
作者
Paromita Choudhury
K. R. Prasanna Kumar
Sukumar Nandi
G. Athithan
机构
[1] DRDO,CAIR
[2] IIT-Guwahati,Department of CSE
[3] DRDO HQ,undefined
来源
关键词
VoIP; Codec; Encryption; Compression; Hamming distance; Auto-correlation; Randomness test;
D O I
暂无
中图分类号
学科分类号
摘要
VoIP traffic classification plays a major role towards network policy enforcements. Characterization of VoIP media traffic is based on codec behaviour. With the introduction of variable bit rate codecs, coding, compression and encryption present different complexities with respect to the classification of VoIP traffic. The randomness tests do not extend directly to classification of compressed and encrypted VoIP traffic. The paper examines the applicability of randomness tests to encrypted and unencrypted VoIP traffic with constant bit rate and variable bit rate codecs. A novel method Construction-by-Selection that constructs a test sequence from partial payload data of VoIP media session is proposed in this paper. The results based on experimentations on this method show that such construction exhibit randomness and hence allows differentiation of encrypted VoIP media traffic from unencrypted VoIP media traffic even in the case of variable bit rate codecs.
引用
收藏
页码:603 / 631
页数:28
相关论文
共 50 条
  • [1] An empirical approach towards characterization of encrypted and unencrypted VoIP traffic
    Choudhury, Paromita
    Kumar, K. R. Prasanna
    Nandi, Sukumar
    Athithan, G.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) : 603 - 631
  • [2] Identification of VoIP encrypted traffic using a machine learning approach
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) : 77 - 92
  • [3] An effective empirical approach to VoIP traffic classification
    Saqib, Nazar Abbas
    Shakeel, Yagoot
    Khan, Moazzam Ali
    Mahmood, Hasan
    Zia, Muhammad
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (02) : 888 - 900
  • [4] A new approach for VoIP traffic characterization
    Estepa, A
    Estepa, R
    Vozmediano, J
    [J]. IEEE COMMUNICATIONS LETTERS, 2004, 8 (10) : 644 - 646
  • [5] Multi-class Traffic Morphing for Encrypted VoIP Communication
    Moore, W. Brad
    Tan, Henry
    Sherr, Micah
    Maloof, Marcus A.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 65 - 85
  • [6] Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
    Wright, Charles V.
    Ballard, Lucas
    Monrose, Fabian
    Masson, Gerald M.
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 43 - 54
  • [7] How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
    Riyad Alshammari
    A. Nur Zincir-Heywood
    [J]. Journal of Network and Systems Management, 2015, 23 : 830 - 869
  • [8] Detecting Encrypted Traffic: A Machine Learning Approach
    Cha, Seunghun
    Kim, Hyoungshick
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 54 - 65
  • [9] How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP?
    Alshammari, Riyad
    Zincir-Heywood, A. Nur
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 830 - 869
  • [10] From traffic classes to content: A hierarchical approach for encrypted traffic classification
    Li, Ying
    Huang, Yi
    Seneviratne, Suranga
    Thilakarathna, Kanchana
    Cheng, Adriel
    Jourjon, Guillaume
    Webb, Darren
    Smith, David B.
    Xu, Richard Yi Da
    [J]. COMPUTER NETWORKS, 2022, 212