2015
DOI: 10.1016/j.jksuci.2014.06.016
|View full text |Cite
|
Sign up to set email alerts
|

Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

Abstract: VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs) and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…VoIP communications have risen in popularity and their identification is a key factor in the telecommunication field either to prioritize or unable them. In consequence, several approaches have been proposed, such as the works in [160], [118], [114], [161], [128]. Some of these works tries to characterize and identify Skype, one of the most complex VoIP applications in the network due to its intricate communication protocol.…”
Section: A Classical Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…VoIP communications have risen in popularity and their identification is a key factor in the telecommunication field either to prioritize or unable them. In consequence, several approaches have been proposed, such as the works in [160], [118], [114], [161], [128]. Some of these works tries to characterize and identify Skype, one of the most complex VoIP applications in the network due to its intricate communication protocol.…”
Section: A Classical Classificationmentioning
confidence: 99%
“…The performance is low compared to supervised approaches K-means [106], [140], [137], Hierarchical clustering [174]. [111], [7], [160], [118], [114], [161], [128], [159], [167], [168], [7], [164]. Naive Bayes [115], [166].…”
Section: B Reconfigurationmentioning
confidence: 99%