Exploiting encrypted and tunneled multimedia calls in high-speed big data environment

被引:18
|
作者
Rathore, M. Mazhar [1 ]
Ahmad, Awais [1 ]
Paul, Anand [1 ]
Rho, Seungmin [2 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Sungkyul Univ, Dept Media Software, Anyang, South Korea
关键词
VoIP; Big data; Tunneling; Hadoop; Spark; INTERNET;
D O I
10.1007/s11042-017-4393-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid increase in the speed as well as the number of users over the Internet, the rate of data generation is enormously grown. In addition, at the same rate, the multimedia transmission especially the usage of VoIP calls is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In most of the developing countries, internet service providers (ISPs) and telecommunication authorities are concerned in detecting such calls to either block or prioritize commercial VoIP. Signature-based, port-based, and pattern-based detection techniques are inaccurate due to the complex and confidential security and tunneling mechanisms used by VoIP. Therefore, in this paper, we proposed a generic, robust, efficient statistical analysis-based solution to identify encrypted and tunneled voice media flows. We extracted six statistical parameters, which are extracted for each flow and compared with threshold values while generating a number of rules to identify VoIP media calls. The paper also offers a complete architecture that can efficiently process high-speed traffic in order to detect VoIP flows at real-time. The proposed system, including the architecture and the algorithm, can be practically implemented in a real environment, such as ISP or telecommunication authority's gateway. We implemented the system using the parallel environment of Hadoop ecosystem with Spark on the top of it to achieve the real-time processing. We evaluated the system by considering 1) the accuracy in terms of detection rate by computing the direct rate and false positive rate and 2) the efficiency in terms of processing power. The result shows that the system has 97.54% direct rate and .00015% false positive rate, which are quite high. The comparative study proved that the proposed system is more accurate than the existing techniques.
引用
收藏
页码:4959 / 4984
页数:26
相关论文
共 49 条
  • [21] High-speed Data Transmission in Wireless and Mobile Networks
    Macha, Tomas
    Nagy, Lubos
    Ochodnicky, Jan
    KNOWLEDGE IN TELECOMMUNICATION TECHNOLOGIES AND OPTICS 2010 (KTTO 2010), 2010, : 22 - 25
  • [22] Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment
    Wu, Bin
    Chen, Xianyi
    Zhang, Caicai
    Mei, Zhuolin
    Zhao, Zhiqiang
    Wu, Zongda
    Yan, Tao
    IEEE ACCESS, 2020, 8 : 214596 - 214604
  • [23] On Mixing High-Speed Updates and In-Memory Queries A Big-Data Architecture for Real-time Analytics
    Zhong, Tao
    Doshi, Kshitij A.
    Tang, Xi
    Lou, Ting
    Lu, Zhongyan
    Li, Hong
    2013 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2013,
  • [24] Intrusion Detection using Decision Tree Model in High-Speed Environment
    Rathore, M. Mazhar
    Saeed, Faisal
    Rehman, Abdul
    Paul, Anand
    Daniel, Alfred
    IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORK SECURITY (ICSNS 2018), 2018, : 301 - 305
  • [25] Dimensioning bandwidth for elastic traffic in high-speed data networks
    Berger, AW
    Kogan, Y
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (05) : 643 - 654
  • [26] A Novel Intelligent Clustering Approach for High Dimensional Data in a Big Data Environment
    Tao, Qian
    Wang, Zhenyu
    Gu, Chunqin
    Chen, Wenyuan
    Lin, Weiqiang
    Lin, Haojie
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [27] Toward Bulk Synchronous Parallel-Based Machine Learning Techniques for Anomaly Detection in High-Speed Big Data Networks
    Siddique, Kamran
    Akhtar, Zahid
    Lee, Haeng-gon
    Kim, Woongsup
    Kim, Yangwoo
    SYMMETRY-BASEL, 2017, 9 (09):
  • [28] A cross-modal multimedia retrieval method using depth correlation mining in big data environment
    Xia, Dongliang
    Miao, Lu
    Fan, Aiwan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) : 1339 - 1354
  • [29] A parallel approach for high utility-based frequent pattern mining in a big data environment
    Krishna Kumar Mohbey
    Sunil Kumar
    Iran Journal of Computer Science, 2021, 4 (3) : 195 - 200
  • [30] A cross-modal multimedia retrieval method using depth correlation mining in big data environment
    Dongliang Xia
    Lu Miao
    Aiwan Fan
    Multimedia Tools and Applications, 2020, 79 : 1339 - 1354