SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 6 (June 2014), PP.62-65
62
Traffic Detection Method for VoIP Applications using Flow Data
R P Joshi, Ashis Saklani, Rajendra Singh Shahi
1
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
2
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
3
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
Abstract:- Recently VoIP applications have been popular due to the wide deployment of the
wired/wireless Internet. Commercial VoIP services typically employ SIP and RTP for signaling and media
transport protocols. Therefore, the VoIP service is vulnerable to a lot of threats because it uses the Internet
where security is not guaranteed. For example, anomaly traffic cases such as hindering call connections,
maliciously canceling calls, and deteriorating quality of voices have already been known. In this paper,
we propose an anomaly traffic detection method for VoIP applications based on the flow monitoring traffic
measurement architecture, called IETF IPFIX. Under IPFIX, we present algorithms to detect BYE DDoS and
RTP flooding anomaly trafc by defining new IPFIX templates for monitoring SIP and RTP flows.
Keywords:- IPFIX, VoIP, anomaly, detection, algorithm
I. INTRODUCTION
Voice over IP (VoIP) delivers voice communication between users through IP networks. Except
Skype which uses a proprietary protocol, most of VoIP services employ Session Initation Protocol (SIP)
[1] and Real-time Transport Protocol (RTP) [2] for connecting call and communicating voice between
users. Thereby VoIP are exposed to several security threats. For example, anomaly trafc such as in
terfering calls or degrading voice quality have been already known. Although secure protocols for SIP
and RTP exist, they have not been fully implemented and deployed. Therefore, we have to devise an
anomaly trafc method for the current VoIP services. In this work, we aim at proposing a flow-based
VoIP anomaly trafc detection method which uses the IETF IP Flow Information eXport (IPFIX) [3]
standard.
We use the flow-based trafc monitoring standard called IPFIX because it could provide flexible
templates useful for monitoring various protocols. In addition, flow-based trafc monitoring architecture
could be easily utilized since routers are typically eqiupped with flow monitoring functions such as Cisco
Net Flow.
Among several VoIP anomaly trafc, we consider only two representative anomalies called BYE Denial
of Service (DoS) and RTP flooding. Malicious attacker can generate these anomalies through snifng
normal VoIP trafc in wireless network. When these anomalies are sent to proxy server or users, they
cause fatal problems such as force call termination and voice quality degradation. In this paper, we
propose two VoIP-related anomaly trafc detection methods against BYE DoS and RTP flooding. We use SIP
header information such as Called and message type, and RTP trafc statistics such as timestamp for detecting
BYE DoS anomaly traffic. For RTP flooding detection, we utilize SSRC and sequence number values of the
RTP header.There are several similar studies to detect anomaly traffic using NetFlow [4]. Aurora [5],
flowscan [6] and nfsen [7] focus on monitoring trafc based on Net Flow, which provide trafc trend
information or statistics. Peakflow[8] and NetQoS [9] could detect anomaly trafc based on NetFlow data.
However, these are not suitable for finding VoIP related attacks. Especially, in [10], it is shown that
INVITE and RTP flooding attacks could be detected using Hellinger Distance. However, this may not
extended to support finding various VoIP attack trafc, because it uses the packet count information.
Traffic Detection Method for VoIP Applications using Flow Data
63
Figure 1: A flow-based anomaly traffic detection architecture
Figure 1 describes an architecture for detecting anomaVoIP trafc using the IPFIX protocol.
II. AN ANOMALY VOIP TRAFFIC DETECTION METHOD
2.1 Traffic monitoring architecture
This architectureconsists of IPFIX flow generator, IPFIX flow collector and flow visualizer.
The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX
flows periodically while monitoring IP packets. The routers or switches in wired networks can be
performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets
at wireless access routers or access points (AP). In the generator, the IP packets are captured, then
analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the
generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using
TCP, UDP or SCTP.
We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX
template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields
of SIP and RTP headers. For in- ance, we catch Call-ID and voice transmission information from SIP headers.
From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX
flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows
and saves the results to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether
anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the
visualizer, we present results of detecting anomaly VoIP trafc.
2.2 AnomalyVoIPtrafficdetectionalgorithms
For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that couldetect BYE
DoS and RTP flooding anomaly trafc.
2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly
trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number
from SIP INVITE and OK messeges. Then, we investigate media traf- fic information after observing the
BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP
trafc is a flooding anomaly.
2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detect- ing
method that utilizes SSRC and sequence number of RTP consists of IPFIX flow generator, IPFIX flow
collector and flow visualizer.
The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports
IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be
Traffic Detection Method for VoIP Applications using Flow Data
64
performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets
at wireless access routers or access points (AP). In the generator, the IP packets are captured, then
analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the
generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using
TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the
default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the
interesting fields of SIP and RTP headers. For instance, we catch Call-ID and voice transmission information
from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe).
The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX
flows and saves the re- sults to database. Our anomaly VoIP trafc detection algo- rithm periodically runs
whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at
the visualizer, we present results of detecting anomaly VoIP trafc.
2.2 Anomaly VoIPtrafficdetectionalgorithms
For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that could
detect BYE DoS and RTP flooding anomaly trafc.
2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly
trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number
from SIP INVITE and OK messeges. Then, we investigate media traffic information after observing the BYE
message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is
a flooding anomaly.
2.2.2 RTP flooding anomaly traffic detection
Figure 3 depicts a RTP flooding anomaly trafc detecting method that utilizes SSRC and sequence
number of RTP header. First, we check SSRC in a flow because it should be the same with the SSRC
value within the same RTP session. If SSRC has been changed at the RTP flow, it should be anomaly
trafc. Second, we use sequence number information because it is possible to inject irrelevant RTP packets
through snifng RTP sessions. In our method, we compare the first and last sequence numbers with the
maximum and minimum sequence numbers in a RTP flow.
Figure 2: An algorithm to detect BYE DoS anomaly traffic
Traffic Detection Method for VoIP Applications using Flow Data
65
Figure 3: An algorithm to detect RTP flooding anomaly traffic
III. CONCLUSION
In this paper, we propose an anomaly VoIP trafc detection method using the IPFIX protocol.
For monitoring VoIP flows, we defined two IPFIX templates which provide information of SIP and RTP
header. Based on the flowmonitoring trafc measurement architecture, we present two VoIP anomaly trafc
detection algorithms against SIP BYE DoS attack and RTP flooding. For the future work, we will look for
VoIP anomalies influenced commercial VoIP services, then proposed these anomalies detection
algorithms. Using IPFIX, [11] has already tried monitoring trafc at 1/10Gbps links with low packet loss
rate. Therefore, our proposed system will be useful for monitoring VoIP trafc at these links.
REFERENCES
[1] ITU-T: Recommendation E.800: Terms and definitions related to quality of service and network
performance including dependability, 2008
[2] ITU-T: Recommendation G.1010: End-user multimedia QoS categories, 2001
[3] ITU-T: Recommendation P.11: Telephone transmission quality, 1993
[4] ITU-T: Recommendation P.800.1: Mean Opinion Score (MOS) terminology, 2006

More Related Content

What's hot

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsChristian Silva Espinoza
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...P1Security
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sipAnna Volynkina
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol AttacksConferencias FIST
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3Carl Ford
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overviewOded Ben-Dori
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)Ahmed Ayman
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
Understanding sip al gs
Understanding sip al gsUnderstanding sip al gs
Understanding sip al gsmaedot
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 

What's hot (19)

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
 
Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
Introduction to VOIP
Introduction to VOIPIntroduction to VOIP
Introduction to VOIP
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Understanding sip al gs
Understanding sip al gsUnderstanding sip al gs
Understanding sip al gs
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
VoIP Recording
VoIP RecordingVoIP Recording
VoIP Recording
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 

Viewers also liked

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Viewers also liked (20)

C1071622
C1071622C1071622
C1071622
 
E1073340
E1073340E1073340
E1073340
 
H1075460
H1075460H1075460
H1075460
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
C1061417
C1061417C1061417
C1061417
 
Design patterns
Design patternsDesign patterns
Design patterns
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1062530
E1062530E1062530
E1062530
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similar to International Journal of Engineering Research and Development

Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming MediaKaniska Mandal
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneeSAT Journals
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsjpstudcorner
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSPDev Heba
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformIRJET Journal
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxTrue or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxgtameka
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 

Similar to International Journal of Engineering Research and Development (20)

Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Voip security
Voip securityVoip security
Voip security
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming Media
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backbone
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSP
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android Platform
 
NFA - Middle East Workshop
NFA - Middle East WorkshopNFA - Middle East Workshop
NFA - Middle East Workshop
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Ip sec
Ip secIp sec
Ip sec
 
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxTrue or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
Wireshark
Wireshark Wireshark
Wireshark
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.62-65 62 Traffic Detection Method for VoIP Applications using Flow Data R P Joshi, Ashis Saklani, Rajendra Singh Shahi 1 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand 2 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand 3 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand Abstract:- Recently VoIP applications have been popular due to the wide deployment of the wired/wireless Internet. Commercial VoIP services typically employ SIP and RTP for signaling and media transport protocols. Therefore, the VoIP service is vulnerable to a lot of threats because it uses the Internet where security is not guaranteed. For example, anomaly traffic cases such as hindering call connections, maliciously canceling calls, and deteriorating quality of voices have already been known. In this paper, we propose an anomaly traffic detection method for VoIP applications based on the flow monitoring traffic measurement architecture, called IETF IPFIX. Under IPFIX, we present algorithms to detect BYE DDoS and RTP flooding anomaly trafc by defining new IPFIX templates for monitoring SIP and RTP flows. Keywords:- IPFIX, VoIP, anomaly, detection, algorithm I. INTRODUCTION Voice over IP (VoIP) delivers voice communication between users through IP networks. Except Skype which uses a proprietary protocol, most of VoIP services employ Session Initation Protocol (SIP) [1] and Real-time Transport Protocol (RTP) [2] for connecting call and communicating voice between users. Thereby VoIP are exposed to several security threats. For example, anomaly trafc such as in terfering calls or degrading voice quality have been already known. Although secure protocols for SIP and RTP exist, they have not been fully implemented and deployed. Therefore, we have to devise an anomaly trafc method for the current VoIP services. In this work, we aim at proposing a flow-based VoIP anomaly trafc detection method which uses the IETF IP Flow Information eXport (IPFIX) [3] standard. We use the flow-based trafc monitoring standard called IPFIX because it could provide flexible templates useful for monitoring various protocols. In addition, flow-based trafc monitoring architecture could be easily utilized since routers are typically eqiupped with flow monitoring functions such as Cisco Net Flow. Among several VoIP anomaly trafc, we consider only two representative anomalies called BYE Denial of Service (DoS) and RTP flooding. Malicious attacker can generate these anomalies through snifng normal VoIP trafc in wireless network. When these anomalies are sent to proxy server or users, they cause fatal problems such as force call termination and voice quality degradation. In this paper, we propose two VoIP-related anomaly trafc detection methods against BYE DoS and RTP flooding. We use SIP header information such as Called and message type, and RTP trafc statistics such as timestamp for detecting BYE DoS anomaly traffic. For RTP flooding detection, we utilize SSRC and sequence number values of the RTP header.There are several similar studies to detect anomaly traffic using NetFlow [4]. Aurora [5], flowscan [6] and nfsen [7] focus on monitoring trafc based on Net Flow, which provide trafc trend information or statistics. Peakflow[8] and NetQoS [9] could detect anomaly trafc based on NetFlow data. However, these are not suitable for finding VoIP related attacks. Especially, in [10], it is shown that INVITE and RTP flooding attacks could be detected using Hellinger Distance. However, this may not extended to support finding various VoIP attack trafc, because it uses the packet count information.
  • 2. Traffic Detection Method for VoIP Applications using Flow Data 63 Figure 1: A flow-based anomaly traffic detection architecture Figure 1 describes an architecture for detecting anomaVoIP trafc using the IPFIX protocol. II. AN ANOMALY VOIP TRAFFIC DETECTION METHOD 2.1 Traffic monitoring architecture This architectureconsists of IPFIX flow generator, IPFIX flow collector and flow visualizer. The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets at wireless access routers or access points (AP). In the generator, the IP packets are captured, then analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields of SIP and RTP headers. For in- ance, we catch Call-ID and voice transmission information from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows and saves the results to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the visualizer, we present results of detecting anomaly VoIP trafc. 2.2 AnomalyVoIPtrafficdetectionalgorithms For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that couldetect BYE DoS and RTP flooding anomaly trafc. 2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number from SIP INVITE and OK messeges. Then, we investigate media traf- fic information after observing the BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is a flooding anomaly. 2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detect- ing method that utilizes SSRC and sequence number of RTP consists of IPFIX flow generator, IPFIX flow collector and flow visualizer. The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be
  • 3. Traffic Detection Method for VoIP Applications using Flow Data 64 performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets at wireless access routers or access points (AP). In the generator, the IP packets are captured, then analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields of SIP and RTP headers. For instance, we catch Call-ID and voice transmission information from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows and saves the re- sults to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the visualizer, we present results of detecting anomaly VoIP trafc. 2.2 Anomaly VoIPtrafficdetectionalgorithms For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that could detect BYE DoS and RTP flooding anomaly trafc. 2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number from SIP INVITE and OK messeges. Then, we investigate media traffic information after observing the BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is a flooding anomaly. 2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detecting method that utilizes SSRC and sequence number of RTP header. First, we check SSRC in a flow because it should be the same with the SSRC value within the same RTP session. If SSRC has been changed at the RTP flow, it should be anomaly trafc. Second, we use sequence number information because it is possible to inject irrelevant RTP packets through snifng RTP sessions. In our method, we compare the first and last sequence numbers with the maximum and minimum sequence numbers in a RTP flow. Figure 2: An algorithm to detect BYE DoS anomaly traffic
  • 4. Traffic Detection Method for VoIP Applications using Flow Data 65 Figure 3: An algorithm to detect RTP flooding anomaly traffic III. CONCLUSION In this paper, we propose an anomaly VoIP trafc detection method using the IPFIX protocol. For monitoring VoIP flows, we defined two IPFIX templates which provide information of SIP and RTP header. Based on the flowmonitoring trafc measurement architecture, we present two VoIP anomaly trafc detection algorithms against SIP BYE DoS attack and RTP flooding. For the future work, we will look for VoIP anomalies influenced commercial VoIP services, then proposed these anomalies detection algorithms. Using IPFIX, [11] has already tried monitoring trafc at 1/10Gbps links with low packet loss rate. Therefore, our proposed system will be useful for monitoring VoIP trafc at these links. REFERENCES [1] ITU-T: Recommendation E.800: Terms and definitions related to quality of service and network performance including dependability, 2008 [2] ITU-T: Recommendation G.1010: End-user multimedia QoS categories, 2001 [3] ITU-T: Recommendation P.11: Telephone transmission quality, 1993 [4] ITU-T: Recommendation P.800.1: Mean Opinion Score (MOS) terminology, 2006