Exploiting encrypted and tunneled multimedia calls in high-speed big data environment

被引:18
|
作者
Rathore, M. Mazhar [1 ]
Ahmad, Awais [1 ]
Paul, Anand [1 ]
Rho, Seungmin [2 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Sungkyul Univ, Dept Media Software, Anyang, South Korea
关键词
VoIP; Big data; Tunneling; Hadoop; Spark; INTERNET;
D O I
10.1007/s11042-017-4393-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid increase in the speed as well as the number of users over the Internet, the rate of data generation is enormously grown. In addition, at the same rate, the multimedia transmission especially the usage of VoIP calls is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In most of the developing countries, internet service providers (ISPs) and telecommunication authorities are concerned in detecting such calls to either block or prioritize commercial VoIP. Signature-based, port-based, and pattern-based detection techniques are inaccurate due to the complex and confidential security and tunneling mechanisms used by VoIP. Therefore, in this paper, we proposed a generic, robust, efficient statistical analysis-based solution to identify encrypted and tunneled voice media flows. We extracted six statistical parameters, which are extracted for each flow and compared with threshold values while generating a number of rules to identify VoIP media calls. The paper also offers a complete architecture that can efficiently process high-speed traffic in order to detect VoIP flows at real-time. The proposed system, including the architecture and the algorithm, can be practically implemented in a real environment, such as ISP or telecommunication authority's gateway. We implemented the system using the parallel environment of Hadoop ecosystem with Spark on the top of it to achieve the real-time processing. We evaluated the system by considering 1) the accuracy in terms of detection rate by computing the direct rate and false positive rate and 2) the efficiency in terms of processing power. The result shows that the system has 97.54% direct rate and .00015% false positive rate, which are quite high. The comparative study proved that the proposed system is more accurate than the existing techniques.
引用
收藏
页码:4959 / 4984
页数:26
相关论文
共 49 条
  • [31] Cloud Computing in Remote Sensing : High Performance Remote Sensing Data Processing in a Big data Environment
    Sabri, Y.
    Aouad, S.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021, 16 (06)
  • [32] Real time intrusion detection system for ultra-high-speed big data environments
    Rathore, M. Mazhar
    Ahmad, Awais
    Paul, Anand
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (09) : 3489 - 3510
  • [33] Real time intrusion detection system for ultra-high-speed big data environments
    M. Mazhar Rathore
    Awais Ahmad
    Anand Paul
    The Journal of Supercomputing, 2016, 72 : 3489 - 3510
  • [34] Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment
    Pustokhina, Irina V.
    Pustokhin, Denis A.
    Lydia, E. Laxmi
    Garg, Puneet
    Kadian, Amarender
    Shankar, K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (24) : 34951 - 34968
  • [35] Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment
    Irina V. Pustokhina
    Denis A. Pustokhin
    E. Laxmi Lydia
    Puneet Garg
    Amarender Kadian
    K. Shankar
    Multimedia Tools and Applications, 2022, 81 : 34951 - 34968
  • [36] High-Performance Integrated Virtual Environment (HIVE) Tools and Applications for Big Data Analysis
    Simonyan, Vahan
    Mazumder, Raja
    GENES, 2014, 5 (04) : 957 - 981
  • [37] Multimedia processing using deep learning technologies, high-performance computing cloud resources, and Big Data volumes
    Mahmoudi, Sidi Ahmed
    Belarbi, Mohammed Amin
    Mahmoudi, Said
    Belalem, Ghalem
    Manneback, Pierre
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (17)
  • [38] Analyst Intuition Based Hidden Markov Model On High Speed, Temporal Cyber Security Big Data
    Teoh, T. T.
    Nguwi, Y. Y.
    Elovici, Yuval
    Cheung, N. M.
    Ng, W. L.
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 2080 - 2083
  • [39] A replication strategy for a distributed high-speed caching system based on spatiotemporal access patterns of geospatial data
    Li, Rui
    Feng, Wei
    Wu, Huayi
    Huang, Qunying
    COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2017, 61 : 163 - 171
  • [40] FPGA implementation of r-FIFO-based high-speed data acquisition IOT architecture model
    Gupta, Sanskriti
    Sharma, Mukul
    Chawla, Rashmi
    SN APPLIED SCIENCES, 2020, 2 (04):