Exploiting encrypted and tunneled multimedia calls in high-speed big data environment

被引:18
|
作者
Rathore, M. Mazhar [1 ]
Ahmad, Awais [1 ]
Paul, Anand [1 ]
Rho, Seungmin [2 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Sungkyul Univ, Dept Media Software, Anyang, South Korea
关键词
VoIP; Big data; Tunneling; Hadoop; Spark; INTERNET;
D O I
10.1007/s11042-017-4393-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid increase in the speed as well as the number of users over the Internet, the rate of data generation is enormously grown. In addition, at the same rate, the multimedia transmission especially the usage of VoIP calls is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In most of the developing countries, internet service providers (ISPs) and telecommunication authorities are concerned in detecting such calls to either block or prioritize commercial VoIP. Signature-based, port-based, and pattern-based detection techniques are inaccurate due to the complex and confidential security and tunneling mechanisms used by VoIP. Therefore, in this paper, we proposed a generic, robust, efficient statistical analysis-based solution to identify encrypted and tunneled voice media flows. We extracted six statistical parameters, which are extracted for each flow and compared with threshold values while generating a number of rules to identify VoIP media calls. The paper also offers a complete architecture that can efficiently process high-speed traffic in order to detect VoIP flows at real-time. The proposed system, including the architecture and the algorithm, can be practically implemented in a real environment, such as ISP or telecommunication authority's gateway. We implemented the system using the parallel environment of Hadoop ecosystem with Spark on the top of it to achieve the real-time processing. We evaluated the system by considering 1) the accuracy in terms of detection rate by computing the direct rate and false positive rate and 2) the efficiency in terms of processing power. The result shows that the system has 97.54% direct rate and .00015% false positive rate, which are quite high. The comparative study proved that the proposed system is more accurate than the existing techniques.
引用
收藏
页码:4959 / 4984
页数:26
相关论文
共 49 条
  • [1] Exploiting encrypted and tunneled multimedia calls in high-speed big data environment
    M. Mazhar Rathore
    Awais Ahmad
    Anand Paul
    Seungmin Rho
    Multimedia Tools and Applications, 2018, 77 : 4959 - 4984
  • [2] High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming
    Rathore, Mazhar
    Paul, Anand
    Ahmad, Awais
    Imran, Muhammad
    Guizani, Mohsen
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 595 - 598
  • [3] Real-time secure communication for Smart City in high-speed Big Data environment
    Rathore, M. Mazhar
    Paul, Anand
    Ahmad, Awais
    Chilamkurti, Naveen
    Hong, Won-Hwa
    Seo, HyunCheol
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 638 - 652
  • [4] High-Speed Big Data Streams: A Literature Review
    Sneha, R. Patil
    Nagaraj, V. Dharwadkar
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 308 - 316
  • [5] Risk diagnosis model for high-speed rail safety operation in big-data environment
    Hu, Qizhou
    Guan, Xin
    Wu, Xiaoyu
    JOURNAL OF TRAFFIC AND TRANSPORTATION ENGINEERING-ENGLISH EDITION, 2025, 12 (01) : 12 - 22
  • [6] Research on Big Data Management for High-speed Railway Equipment
    Shao, Yiqi
    Liu, Renkui
    Wang, Futian
    Chen, Mingdian
    PROGRESS IN MECHATRONICS AND INFORMATION TECHNOLOGY, PTS 1 AND 2, 2014, 462-463 : 405 - +
  • [7] A High-Speed Network Data Acquisition System Based on Big Data Platform
    Zhao, Jingling
    Yin, Congxian
    Jin, Xiaohui
    Liu, Weiliang
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 677 - 681
  • [8] Intrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach
    Siddique, Kamran
    Akhtar, Zahid
    Kim, Yangwoo
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1364 - 1370
  • [9] A Platform for Fault Diagnosis of High-Speed Train based on Big Data
    Xu, Quan
    Zhang, Peng
    Liu, Wenqin
    Liu, Qiang
    Liu, Changxin
    Wang, Liangyong
    Toprac, Anthony
    Qin, S. Joe
    IFAC PAPERSONLINE, 2018, 51 (18): : 309 - 314
  • [10] Hybrid Big Data Architecture for High-Speed Log Anomaly Detection
    Tangsatjatham, Pittayut
    Nupairoj, Natawut
    2016 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2016, : 538 - 543