Article citationsMore >>

Chou, W. “Strategies to Keep Your VoIP Network Secure” IEEE IT Professional September.-October. 2007.

has been cited by the following article:

Article

Identification of Hidden VoIP (Grey Traffic)

1National University of Science and Technology, Pakistan

2Centre for Advanced Studies in Engineering, Pakistan


Journal of Computer Networks. 2013, Vol. 1 No. 2, 15-27
DOI: 10.12691/jcn-1-2-1
Copyright © 2013 Science and Education Publishing

Cite this paper:
Ch. M. Asim Rasheed, Ayesha Khaliq, Ammara Sajid, Sana Ajmal. Identification of Hidden VoIP (Grey Traffic). Journal of Computer Networks. 2013; 1(2):15-27. doi: 10.12691/jcn-1-2-1.

Correspondence to: Sana Ajmal, Centre for Advanced Studies in Engineering, Pakistan. Email: sana.ajmal84@yahoo.com

Abstract

National Telecommunication Regulator in many countries around the world imposes call termination taxes on national calls as well as international calls landing in that country. In many third world countries, every year up to 90 % of the international traffic bypasses regulatory checks, causing a huge revenue loss to the country. The use of illegal gateways to bypass the Voice Clearing Houses to terminate international traffic using VoIP gateways, GSM / local line branch exchanges or other related equipment are the simplest means of Grey traffic. Use of the encryption and other network design techniques are the easiest methods to hide the VoIP traffic from any clearing house. We have proposed an architecture based on a mathematical model to detect, segregate and qualify VoIP traffic (Grey) into different categories. The proposed model identifies grey traffic, through traffic analysis techniques coupled with statistical anomaly based intrusion detection system and behavior analysis.

Keywords