A NOVEL PACKET CLASSIFICATION TECHNIQUE FOR VOIP CANDIDATURE IN DEEP PACKET INSPECTION
Abstract
Voice over Internet telephony (VoIP) is extremely pervasive today. Its cheap availability and ease of setup has made the serial harassers, criminals and even terrorists to use it for illegal activities. This makes VoIP subject to surveillance by Law Enforcement Agencies (LEAs). It has been observed that governments, in the solemn interest of national security, request companies like Skype, Google and others to hand over content of communications between suspected criminals. Seeing a business opportunity, the companies charge exorbitantly for retrieval thus costing the exchequer. Unlike any mechanisms of lawful interception which allow for an asymmetric and unsustainable monopoly, this paper proposes hidden placement of hardware network analyzers to perform deep packet inspection for network traffic payloads and intercepting them before they reach the voice service provider by performing packet classification in constant time using a Frame Check Sequence based classification technique as opposed to existing layer-by-layer techniques for determining packets as candidates for Deep Packet Inspection.
References
Abdullah A, Kim K, Raymond C, Lin Liu “A study of ten popular Android mobile VoIP applications: Are the communications encrypted?”, 47th Hawaii International Conference on System Science, 2014, pp- 4858 – 4867
Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, and Aiko Pras, "Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX," IEEE Communication surveys and Tutorials, Vol. 16, No. 4, Fourth Quarter, 2014
Emanuel P. Freire, Artur Ziviani and Ronaldo M. Salles, “Detecting VoIP Calls Hidden in Web Traffic,” IEEE transaction on network and service management, Vol no. 5, pp- 210-214, December 2008.
Ye Zhu and Huirong Fu, “Traffic analysis attacks on Skype VoIP calls,”
ELSEVIER: Computer Communications, vol. 34, pp 1202-1212, 2011.
T. Okabe, T. Kitamura, and T. Shizuno, “Statistical Traffic Identification
Method Based on Flow-Level Behavior for Fair VoIP service”, Proceedings of IEEE Workshop on VoIP Management and Security, pp. 35-40, April 2006.
Andro Milanovic, SiniGa Srhljic, Ivo Rainjevic, Darryl Sladden, Ivan MatoSevic, and Daniel Skrobo, “Methods for Lawful Interception in IP
Telephony Networks Based on H.323”, EUROCON 2003, Ljublijana, Slovenia pp 198-202.
Andro Milanovic, SiniGa Srhljic, Ivo Rainjevic, Darryl Sladden, Ivan MatoSevic, and Daniel Skrobo, “Distributed system for Lawful interception in VoIP networks”, EUROCON 2003, Ljublijana, Slovenia, pp 203-207.
Balamurugan K, Radu State, Olivier Festor, “Monitoring Architecture for Lawful Interception inVoIP Networks”, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), pp-5-9
P Branch, A Pavlac, ,G Armitage, "Using MAC Addresses In the Lawful Interceptiion of IP Traffic," Proc Australlian Telecommunications Networks & Applications Conference (ATNAC), Sydney, Australla, December 2004, pp 9-11
Joshua Broadway, Benjamin Turnbull, Jill Slay, Member, IEEE, “Improving the Analysis of Lawfully Intercepted Network Packet Data Captured For Forensic Analysis”,The Third International Conference on Availability, Reliability and Security, Sydney, Australia, 2008 pp. 1361-1368.
Dipl. lng. Bernhard Spalt, “Current challenges for lawful interception”, World Telecommunications Congress, Vienna, Austria, 2010, pp. 164-169
Bruce Hartpence, “Packet Guide to Core Network Protocols,” O'Reilly, 2011.
Rafael Antonello, Stenio Fernandes, Carlos Kamienski, Djamel Sadok, Judith Kelner, IstváN GóDor, GéZa Szabó and Tord Westholm, "Deep packet inspection tools and techniques in commodity platforms: Challenges and trends," Journal of Network and Computer Applications (JNCA), vol. 35, (6), 2012, pp. 1863-1878.
Rosenberg J. SIP: Session Initiation Protocol [EB/OL].2002.
http://www.ietf.org/rfc/rfc3261.txt.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.