A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection

Summary Skype, Google Talk, Yahoo voice etc. are all applications that enable the use of the Internet for voice conversations. They offer cost effectiveness and are easy to use, and due to these reasons many new VoIP applications are coming into existence. However, all forms of communications need to be monitored for security purposes to ensure their correct usage. With the development of more and more VoIP applications, monitoring and detection of these applications is becoming a more difficult task. Most detection techniques are based on standard protocol and IP address identification. Thus, application detection and monitoring techniques are developed after an application has been in use for some time, resulting in obvious security implications. This paper presents generic techniques for the detection of traffic generated by all VoIP protocols, both currently in existence and any future VoIP protocols that may be used. The method proposed is based on analysis carried out on different VoIP applications currently in existence.

[1]  Sven Ehlert,et al.  Analysis and Signature of Skype VoIP Session Traffic , 2006 .

[2]  S. Cherry The VoIP backlash , 2005, IEEE Spectrum.

[3]  Matthew DeSantis Understanding Voice over Internet Protocol (VoIP) , 2008 .

[4]  Sushil Jajodia,et al.  Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.

[5]  P. Lawson,et al.  Federal Communications Commission , 2004, Bell Labs Technical Journal.

[6]  Henning Schulzrinne,et al.  Feature Interaction in Internet Telephony , 2000, FIW.

[7]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[8]  Yuen-Yan Chan,et al.  Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics , 2007, 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007).

[9]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[10]  KITAMURA Tsutomu,et al.  Traffic Identification for Dependable VoIP , 2006 .