Exploiting encrypted and tunneled multimedia calls in high-speed big data environment

被引:18
|
作者
Rathore, M. Mazhar [1 ]
Ahmad, Awais [1 ]
Paul, Anand [1 ]
Rho, Seungmin [2 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Sungkyul Univ, Dept Media Software, Anyang, South Korea
关键词
VoIP; Big data; Tunneling; Hadoop; Spark; INTERNET;
D O I
10.1007/s11042-017-4393-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid increase in the speed as well as the number of users over the Internet, the rate of data generation is enormously grown. In addition, at the same rate, the multimedia transmission especially the usage of VoIP calls is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In most of the developing countries, internet service providers (ISPs) and telecommunication authorities are concerned in detecting such calls to either block or prioritize commercial VoIP. Signature-based, port-based, and pattern-based detection techniques are inaccurate due to the complex and confidential security and tunneling mechanisms used by VoIP. Therefore, in this paper, we proposed a generic, robust, efficient statistical analysis-based solution to identify encrypted and tunneled voice media flows. We extracted six statistical parameters, which are extracted for each flow and compared with threshold values while generating a number of rules to identify VoIP media calls. The paper also offers a complete architecture that can efficiently process high-speed traffic in order to detect VoIP flows at real-time. The proposed system, including the architecture and the algorithm, can be practically implemented in a real environment, such as ISP or telecommunication authority's gateway. We implemented the system using the parallel environment of Hadoop ecosystem with Spark on the top of it to achieve the real-time processing. We evaluated the system by considering 1) the accuracy in terms of detection rate by computing the direct rate and false positive rate and 2) the efficiency in terms of processing power. The result shows that the system has 97.54% direct rate and .00015% false positive rate, which are quite high. The comparative study proved that the proposed system is more accurate than the existing techniques.
引用
收藏
页码:4959 / 4984
页数:26
相关论文
共 49 条
  • [41] Fast Fourier transform based efficient data processing technique for big data processing speed enhancement in P2P computing environment
    Yoon-Su Jeong
    Seung-Soo Shin
    Peer-to-Peer Networking and Applications, 2018, 11 : 1186 - 1196
  • [43] RETRACTION: RETRACTED: Research on construction and implementation of panoramic multimedia video information space model in big data environment (Retraction of Vol 82, Pg 1, 2019)
    Kong, Lili
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 27085 - 27085
  • [44] Estimating Schedule-Based Assignment Models for High-Speed Rail (HSR) Services Using Multiple Data Sources
    Silvestri, Fulvio
    Montino, Tommaso
    Mariano, Pietro
    SOCIOECONOMIC IMPACTS OF HIGH-SPEED RAIL SYSTEMS, IW-HSR 2023, 2024, : 149 - 172
  • [45] Research on Information Literacy Education Model in the Big Data Environment - A Case Study of six Hainan high school Libraries
    Wang X.
    Ye H.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [46] Research on requirement elicitation model of high-end equipment based on requirement classification under Internet and big data environment
    Guo, Yu
    Wu, Junting
    Yang, Ke-wei
    Yu, Lixin
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2016, 71 : 685 - 692
  • [47] Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
    Alrayes, Fatma S.
    Maray, Mohammed
    Alshuhail, Asma
    Almustafa, Khaled Mohamad
    Darem, Abdulbasit A.
    Al-Sharafi, Ali M.
    Alotaibi, Shoayee Dlaim
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [48] Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks
    Wu, Hua
    Liu, Yujie
    Cheng, Guang
    Hu, Xiaoyan
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5070 - 5075
  • [49] RETRACTED: High-Concurrency Big Data Precision Marketing and Advertising Recommendation under 5G Wireless Communication Network Environment (Retracted Article)
    Chen, Xianfeng
    JOURNAL OF SENSORS, 2022, 2022