SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 6 (June 2014), PP.62-65
62
Traffic Detection Method for VoIP Applications using Flow Data
R P Joshi, Ashis Saklani, Rajendra Singh Shahi
1
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
2
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
3
Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand
Abstract:- Recently VoIP applications have been popular due to the wide deployment of the
wired/wireless Internet. Commercial VoIP services typically employ SIP and RTP for signaling and media
transport protocols. Therefore, the VoIP service is vulnerable to a lot of threats because it uses the Internet
where security is not guaranteed. For example, anomaly traffic cases such as hindering call connections,
maliciously canceling calls, and deteriorating quality of voices have already been known. In this paper,
we propose an anomaly traffic detection method for VoIP applications based on the flow monitoring traffic
measurement architecture, called IETF IPFIX. Under IPFIX, we present algorithms to detect BYE DDoS and
RTP flooding anomaly trafc by defining new IPFIX templates for monitoring SIP and RTP flows.
Keywords:- IPFIX, VoIP, anomaly, detection, algorithm
I. INTRODUCTION
Voice over IP (VoIP) delivers voice communication between users through IP networks. Except
Skype which uses a proprietary protocol, most of VoIP services employ Session Initation Protocol (SIP)
[1] and Real-time Transport Protocol (RTP) [2] for connecting call and communicating voice between
users. Thereby VoIP are exposed to several security threats. For example, anomaly trafc such as in
terfering calls or degrading voice quality have been already known. Although secure protocols for SIP
and RTP exist, they have not been fully implemented and deployed. Therefore, we have to devise an
anomaly trafc method for the current VoIP services. In this work, we aim at proposing a flow-based
VoIP anomaly trafc detection method which uses the IETF IP Flow Information eXport (IPFIX) [3]
standard.
We use the flow-based trafc monitoring standard called IPFIX because it could provide flexible
templates useful for monitoring various protocols. In addition, flow-based trafc monitoring architecture
could be easily utilized since routers are typically eqiupped with flow monitoring functions such as Cisco
Net Flow.
Among several VoIP anomaly trafc, we consider only two representative anomalies called BYE Denial
of Service (DoS) and RTP flooding. Malicious attacker can generate these anomalies through snifng
normal VoIP trafc in wireless network. When these anomalies are sent to proxy server or users, they
cause fatal problems such as force call termination and voice quality degradation. In this paper, we
propose two VoIP-related anomaly trafc detection methods against BYE DoS and RTP flooding. We use SIP
header information such as Called and message type, and RTP trafc statistics such as timestamp for detecting
BYE DoS anomaly traffic. For RTP flooding detection, we utilize SSRC and sequence number values of the
RTP header.There are several similar studies to detect anomaly traffic using NetFlow [4]. Aurora [5],
flowscan [6] and nfsen [7] focus on monitoring trafc based on Net Flow, which provide trafc trend
information or statistics. Peakflow[8] and NetQoS [9] could detect anomaly trafc based on NetFlow data.
However, these are not suitable for finding VoIP related attacks. Especially, in [10], it is shown that
INVITE and RTP flooding attacks could be detected using Hellinger Distance. However, this may not
extended to support finding various VoIP attack trafc, because it uses the packet count information.
Traffic Detection Method for VoIP Applications using Flow Data
63
Figure 1: A flow-based anomaly traffic detection architecture
Figure 1 describes an architecture for detecting anomaVoIP trafc using the IPFIX protocol.
II. AN ANOMALY VOIP TRAFFIC DETECTION METHOD
2.1 Traffic monitoring architecture
This architectureconsists of IPFIX flow generator, IPFIX flow collector and flow visualizer.
The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX
flows periodically while monitoring IP packets. The routers or switches in wired networks can be
performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets
at wireless access routers or access points (AP). In the generator, the IP packets are captured, then
analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the
generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using
TCP, UDP or SCTP.
We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX
template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields
of SIP and RTP headers. For in- ance, we catch Call-ID and voice transmission information from SIP headers.
From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX
flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows
and saves the results to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether
anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the
visualizer, we present results of detecting anomaly VoIP trafc.
2.2 AnomalyVoIPtrafficdetectionalgorithms
For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that couldetect BYE
DoS and RTP flooding anomaly trafc.
2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly
trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number
from SIP INVITE and OK messeges. Then, we investigate media traf- fic information after observing the
BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP
trafc is a flooding anomaly.
2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detect- ing
method that utilizes SSRC and sequence number of RTP consists of IPFIX flow generator, IPFIX flow
collector and flow visualizer.
The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports
IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be
Traffic Detection Method for VoIP Applications using Flow Data
64
performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets
at wireless access routers or access points (AP). In the generator, the IP packets are captured, then
analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the
generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using
TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the
default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the
interesting fields of SIP and RTP headers. For instance, we catch Call-ID and voice transmission information
from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe).
The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX
flows and saves the re- sults to database. Our anomaly VoIP trafc detection algo- rithm periodically runs
whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at
the visualizer, we present results of detecting anomaly VoIP trafc.
2.2 Anomaly VoIPtrafficdetectionalgorithms
For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that could
detect BYE DoS and RTP flooding anomaly trafc.
2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly
trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number
from SIP INVITE and OK messeges. Then, we investigate media traffic information after observing the BYE
message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is
a flooding anomaly.
2.2.2 RTP flooding anomaly traffic detection
Figure 3 depicts a RTP flooding anomaly trafc detecting method that utilizes SSRC and sequence
number of RTP header. First, we check SSRC in a flow because it should be the same with the SSRC
value within the same RTP session. If SSRC has been changed at the RTP flow, it should be anomaly
trafc. Second, we use sequence number information because it is possible to inject irrelevant RTP packets
through snifng RTP sessions. In our method, we compare the first and last sequence numbers with the
maximum and minimum sequence numbers in a RTP flow.
Figure 2: An algorithm to detect BYE DoS anomaly traffic
Traffic Detection Method for VoIP Applications using Flow Data
65
Figure 3: An algorithm to detect RTP flooding anomaly traffic
III. CONCLUSION
In this paper, we propose an anomaly VoIP trafc detection method using the IPFIX protocol.
For monitoring VoIP flows, we defined two IPFIX templates which provide information of SIP and RTP
header. Based on the flowmonitoring trafc measurement architecture, we present two VoIP anomaly trafc
detection algorithms against SIP BYE DoS attack and RTP flooding. For the future work, we will look for
VoIP anomalies influenced commercial VoIP services, then proposed these anomalies detection
algorithms. Using IPFIX, [11] has already tried monitoring trafc at 1/10Gbps links with low packet loss
rate. Therefore, our proposed system will be useful for monitoring VoIP trafc at these links.
REFERENCES
[1] ITU-T: Recommendation E.800: Terms and definitions related to quality of service and network
performance including dependability, 2008
[2] ITU-T: Recommendation G.1010: End-user multimedia QoS categories, 2001
[3] ITU-T: Recommendation P.11: Telephone transmission quality, 1993
[4] ITU-T: Recommendation P.800.1: Mean Opinion Score (MOS) terminology, 2006

Contenu connexe

Tendances

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsChristian Silva Espinoza
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...P1Security
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sipAnna Volynkina
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol AttacksConferencias FIST
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3Carl Ford
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overviewOded Ben-Dori
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)Ahmed Ayman
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
Understanding sip al gs
Understanding sip al gsUnderstanding sip al gs
Understanding sip al gsmaedot
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeP1Security
 

Tendances (19)

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
Philippe Langlois - SCTPscan Finding entry points to SS7 Networks & Telecommu...
 
Tlc 004 - take a sip of sip
Tlc 004 - take a sip of sipTlc 004 - take a sip of sip
Tlc 004 - take a sip of sip
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
 
Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 
Introduction to VOIP
Introduction to VOIPIntroduction to VOIP
Introduction to VOIP
 
Sinnreich Henry Johnston Alan Pt 3
Sinnreich Henry Johnston Alan   Pt 3Sinnreich Henry Johnston Alan   Pt 3
Sinnreich Henry Johnston Alan Pt 3
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 
Exploiting Layer 2
Exploiting Layer 2Exploiting Layer 2
Exploiting Layer 2
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
SIP for geeks
SIP for geeksSIP for geeks
SIP for geeks
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Understanding sip al gs
Understanding sip al gsUnderstanding sip al gs
Understanding sip al gs
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
VoIP Recording
VoIP RecordingVoIP Recording
VoIP Recording
 
Attacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchangeAttacking GRX - GPRS Roaming eXchange
Attacking GRX - GPRS Roaming eXchange
 

En vedette

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

En vedette (20)

C1071622
C1071622C1071622
C1071622
 
E1073340
E1073340E1073340
E1073340
 
H1075460
H1075460H1075460
H1075460
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
C1061417
C1061417C1061417
C1061417
 
Design patterns
Design patternsDesign patterns
Design patterns
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1062530
E1062530E1062530
E1062530
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similaire à International Journal of Engineering Research and Development

Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming MediaKaniska Mandal
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneeSAT Journals
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsjpstudcorner
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSPDev Heba
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformIRJET Journal
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP ThousandEyes
 
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxTrue or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxgtameka
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 

Similaire à International Journal of Engineering Research and Development (20)

Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Voip security
Voip securityVoip security
Voip security
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming Media
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Tracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backboneTracing of voip traffic in the rapid flow internet backbone
Tracing of voip traffic in the rapid flow internet backbone
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSP
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android Platform
 
NFA - Middle East Workshop
NFA - Middle East WorkshopNFA - Middle East Workshop
NFA - Middle East Workshop
 
Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP Introduction to VoIP, RTP and SIP
Introduction to VoIP, RTP and SIP
 
Ip sec
Ip secIp sec
Ip sec
 
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docxTrue or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
True or False Explain Why- 1- SIP and RTP are protocols used to allow.docx
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
Wireshark
Wireshark Wireshark
Wireshark
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 

Plus de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Plus de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Dernier

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Dernier (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.62-65 62 Traffic Detection Method for VoIP Applications using Flow Data R P Joshi, Ashis Saklani, Rajendra Singh Shahi 1 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand 2 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand 3 Assistant Professor Kumaon Institute of Technology (BTKIT) Dwarahat, Almora, Uttarakhand Abstract:- Recently VoIP applications have been popular due to the wide deployment of the wired/wireless Internet. Commercial VoIP services typically employ SIP and RTP for signaling and media transport protocols. Therefore, the VoIP service is vulnerable to a lot of threats because it uses the Internet where security is not guaranteed. For example, anomaly traffic cases such as hindering call connections, maliciously canceling calls, and deteriorating quality of voices have already been known. In this paper, we propose an anomaly traffic detection method for VoIP applications based on the flow monitoring traffic measurement architecture, called IETF IPFIX. Under IPFIX, we present algorithms to detect BYE DDoS and RTP flooding anomaly trafc by defining new IPFIX templates for monitoring SIP and RTP flows. Keywords:- IPFIX, VoIP, anomaly, detection, algorithm I. INTRODUCTION Voice over IP (VoIP) delivers voice communication between users through IP networks. Except Skype which uses a proprietary protocol, most of VoIP services employ Session Initation Protocol (SIP) [1] and Real-time Transport Protocol (RTP) [2] for connecting call and communicating voice between users. Thereby VoIP are exposed to several security threats. For example, anomaly trafc such as in terfering calls or degrading voice quality have been already known. Although secure protocols for SIP and RTP exist, they have not been fully implemented and deployed. Therefore, we have to devise an anomaly trafc method for the current VoIP services. In this work, we aim at proposing a flow-based VoIP anomaly trafc detection method which uses the IETF IP Flow Information eXport (IPFIX) [3] standard. We use the flow-based trafc monitoring standard called IPFIX because it could provide flexible templates useful for monitoring various protocols. In addition, flow-based trafc monitoring architecture could be easily utilized since routers are typically eqiupped with flow monitoring functions such as Cisco Net Flow. Among several VoIP anomaly trafc, we consider only two representative anomalies called BYE Denial of Service (DoS) and RTP flooding. Malicious attacker can generate these anomalies through snifng normal VoIP trafc in wireless network. When these anomalies are sent to proxy server or users, they cause fatal problems such as force call termination and voice quality degradation. In this paper, we propose two VoIP-related anomaly trafc detection methods against BYE DoS and RTP flooding. We use SIP header information such as Called and message type, and RTP trafc statistics such as timestamp for detecting BYE DoS anomaly traffic. For RTP flooding detection, we utilize SSRC and sequence number values of the RTP header.There are several similar studies to detect anomaly traffic using NetFlow [4]. Aurora [5], flowscan [6] and nfsen [7] focus on monitoring trafc based on Net Flow, which provide trafc trend information or statistics. Peakflow[8] and NetQoS [9] could detect anomaly trafc based on NetFlow data. However, these are not suitable for finding VoIP related attacks. Especially, in [10], it is shown that INVITE and RTP flooding attacks could be detected using Hellinger Distance. However, this may not extended to support finding various VoIP attack trafc, because it uses the packet count information.
  • 2. Traffic Detection Method for VoIP Applications using Flow Data 63 Figure 1: A flow-based anomaly traffic detection architecture Figure 1 describes an architecture for detecting anomaVoIP trafc using the IPFIX protocol. II. AN ANOMALY VOIP TRAFFIC DETECTION METHOD 2.1 Traffic monitoring architecture This architectureconsists of IPFIX flow generator, IPFIX flow collector and flow visualizer. The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets at wireless access routers or access points (AP). In the generator, the IP packets are captured, then analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields of SIP and RTP headers. For in- ance, we catch Call-ID and voice transmission information from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows and saves the results to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the visualizer, we present results of detecting anomaly VoIP trafc. 2.2 AnomalyVoIPtrafficdetectionalgorithms For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that couldetect BYE DoS and RTP flooding anomaly trafc. 2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number from SIP INVITE and OK messeges. Then, we investigate media traf- fic information after observing the BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is a flooding anomaly. 2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detect- ing method that utilizes SSRC and sequence number of RTP consists of IPFIX flow generator, IPFIX flow collector and flow visualizer. The IPFIX flow generator at the flow monitoring servers or within routers/switches creates and exports IPFIX flows periodically while monitoring IP packets. The routers or switches in wired networks can be
  • 3. Traffic Detection Method for VoIP Applications using Flow Data 64 performed IPFIX flows generation. In addition, we can generate IPFIX flows through monitoring IP packets at wireless access routers or access points (AP). In the generator, the IP packets are captured, then analyzed in detail. Analyzed information of the packet is maintained by flow entries. Periodically, the generator makes the IPFIX flows from the flow entries, then send them to the IPFIX flow collector using TCP, UDP or SCTP. We define two IPFIX templates for monitoring SIP and RTP trafc, because the default IPFIX template is not useful for delivering VoIP-related information. The defined templates carry the interesting fields of SIP and RTP headers. For instance, we catch Call-ID and voice transmission information from SIP headers. From RTP header, we capture sequence number and SSRC (Synchronization SouRCe). The IPFIX flow collector receives IPFIX flows from the IPFIX genera- tor. The collector analyzes IPFIX flows and saves the re- sults to database. Our anomaly VoIP trafc detection algo- rithm periodically runs whether anomaly VoIP trafc exist at the saved trafc measurement information in database or not. Then, at the visualizer, we present results of detecting anomaly VoIP trafc. 2.2 Anomaly VoIPtrafficdetectionalgorithms For detecting anomaly VoIP trafc using the IPFIX frame work, we propose two algorithms that could detect BYE DoS and RTP flooding anomaly trafc. 2.2.1 BYE DoS anomaly traffic detection Figure 2 shows the method for detecting BYE DoS anomaly trafc. When we observe SIP and RTP packets, we extracts session information of IP address and port number from SIP INVITE and OK messeges. Then, we investigate media traffic information after observing the BYE message. If RTP trafc is observed after BYE message, it could be highly considered that this RTP trafc is a flooding anomaly. 2.2.2 RTP flooding anomaly traffic detection Figure 3 depicts a RTP flooding anomaly trafc detecting method that utilizes SSRC and sequence number of RTP header. First, we check SSRC in a flow because it should be the same with the SSRC value within the same RTP session. If SSRC has been changed at the RTP flow, it should be anomaly trafc. Second, we use sequence number information because it is possible to inject irrelevant RTP packets through snifng RTP sessions. In our method, we compare the first and last sequence numbers with the maximum and minimum sequence numbers in a RTP flow. Figure 2: An algorithm to detect BYE DoS anomaly traffic
  • 4. Traffic Detection Method for VoIP Applications using Flow Data 65 Figure 3: An algorithm to detect RTP flooding anomaly traffic III. CONCLUSION In this paper, we propose an anomaly VoIP trafc detection method using the IPFIX protocol. For monitoring VoIP flows, we defined two IPFIX templates which provide information of SIP and RTP header. Based on the flowmonitoring trafc measurement architecture, we present two VoIP anomaly trafc detection algorithms against SIP BYE DoS attack and RTP flooding. For the future work, we will look for VoIP anomalies influenced commercial VoIP services, then proposed these anomalies detection algorithms. Using IPFIX, [11] has already tried monitoring trafc at 1/10Gbps links with low packet loss rate. Therefore, our proposed system will be useful for monitoring VoIP trafc at these links. REFERENCES [1] ITU-T: Recommendation E.800: Terms and definitions related to quality of service and network performance including dependability, 2008 [2] ITU-T: Recommendation G.1010: End-user multimedia QoS categories, 2001 [3] ITU-T: Recommendation P.11: Telephone transmission quality, 1993 [4] ITU-T: Recommendation P.800.1: Mean Opinion Score (MOS) terminology, 2006