Data Analysis and Summarization to Detect Illegal VOIP Traffic with Call Detail Records

over Internet Protocol (VoIP) is an advanced area for researchers. Many different methods are used to send voice over IP networks. With the development of modern telecommunications equipments and softwares telecommunication's malpractices are growing rapidly. Hence there is always a need for monitoring communications and guarantee both security and proper usage. This underlined research work stresses on the analysis of IP traffic and proposes an algorithm for detection mechanisms to control and limit VoIP's grey traffic. The algorithm emphasizes primarily on Session Initiation Protocol (SIP) but it can be modified and used for all VoIP protocols like H.323 and Inter- Asterisk eXchange protocol (IAX2). The suggested method is based on analyzing the pcap files. These files are used to filter VoIP traffic from network's total IP traffic by reading the header of each packet. The algorithm then extracts different parameters for generating call logs. VoIP packets of the same call are correlated to produce a Call Detail Record (CDR). The produced CDR contains the IP addresses of source and destination that make the calls. For identification of grey traffic these IP addresses are used. If the source IP address in the CDR is of a legal registered operator the user/call is declared as legal, otherwise the user/call is illegal. Keywords-Asterisk eXchange protocol (IAX), Internet Protocol (IP), Session Initiation Protocol (SIP), VoIP-Voice over IP (VoIP), Call Detail Record (CDRs)

[1]  Georg Carle,et al.  Principles, Systems and Applications of IP Telecommunications , 2010, IPTComm 2010.

[2]  Gerald Quirchmayr,et al.  A Privacy preserving Approach to Call Detail Records Analysis in VoIP Systems , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[3]  Dragana Becejski-Vujaklija,et al.  A call detail records data mart: Data modeling and OLAP analysis , 2009, Comput. Sci. Inf. Syst..

[4]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[5]  Chao Yang,et al.  Detecting Faults in IP-PBX with Deterministic Dendritic Cell Algorithm , 2011 .

[6]  Aslam Khan,et al.  A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection , 2008 .

[7]  Saverio Niccolini,et al.  Lessons learned on the usage of call logs for security and management in IP telephony , 2010, IEEE Communications Magazine.

[8]  Mohd Shafri Kamaruddin,et al.  Leveraging Missing Values in Call Detail Record Using Naïve Bayes for Fraud Analysis , 2008, 2008 International Conference on Information Networking.

[9]  Euthimios Panagos,et al.  Near Real-Time Call Detail Record ETL Flows , 2009, BIRTE.

[10]  KITAMURA Tsutomu,et al.  Traffic Identification for Dependable VoIP , 2006 .

[11]  Chin-Laung Lei,et al.  Detecting VoIP Traffic Based on Human Conversation Patterns , 2008, IPTComm.