Advertisement

Detecting VoIP Traffic Based on Human Conversation Patterns

  • Chen-Chi Wu
  • Kuan-Ta Chen
  • Yu-Chun Chang
  • Chin-Laung Lei
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5310)

Abstract

Owing to the enormous growth of VoIP applications, an effective means of identifying VoIP is now essential for managing a number of network traffic issues, such as reserving bandwidth for VoIP traffic, assigning high priority for VoIP flows, or blocking VoIP calls to certain destinations. Because the protocols, port numbers, and codecs used by VoIP services are shifting toward proprietary, encrypted, and dynamic methods, traditional VoIP identification approaches, including port- and payload-based schemes, are now less effective. Developing a traffic identification scheme that can work for general VoIP flows is therefore of paramount importance.

In this paper, we propose a VoIP flow identification scheme based on the unique interaction pattern of human conversations. Our scheme is particularly useful for two reasons: 1) flow detection relies on human conversations rather than packet timing; thus, it is resistant to network variability; and 2) detection is based on a short sequence of voice activities rather than the whole packet stream. Hence, the scheme can operate as a traffic management module to provide QoS guarantees or block VoIP calls in real time. The performance evaluation, which is based on extensive real-life traffic traces, shows that the proposed method achieves an identification accuracy of 95% in the first 4 seconds of the detection period and 97% in 11 seconds.

Keywords

Human Speech Internet Measurement Markov Model  Skype Traffic Classification Voice Activity Detection 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
  5. 5.
    Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings of the ACM SIGMETRICS 2005, Banff, Alberta, Canada, pp. 50–60 (2005)Google Scholar
  6. 6.
    Erman, J., Mahanti, A., Arlitt, M.F.: Internet traffic identification using machine learning. In: Proceedings of the IEEE GLOBECOM 2006, San Francisco, California, USA, pp. 1–6 (2006)Google Scholar
  7. 7.
    Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th international conference on World Wide Web, Banff, Alberta, Canada, pp. 883–892 (2007)Google Scholar
  8. 8.
    Dahmouni, H., Vaton, S., Rossé, D.: A markovian signature-based approach to ip traffic classification. In: Proceedings of the 3rd annual ACM workshop on Mining network data, San Diego, California, USA, pp. 29–34 (2007)Google Scholar
  9. 9.
    Chen, K.T., Huang, C.Y., Huang, P., Lei, C.L.: Quantifying Skype user satisfaction. In: Proceedings of ACM SIGCOMM 2006, Pisa, Italy, pp. 399–410 (September 2006)Google Scholar
  10. 10.
    Qiu, D., Srikant, R.: Modeling and performance analysis of bittorrent-like peer-to-peer networks. In: Proceedings of ACM SIGCOMM 2004, Portland, OR, USA, pp. 367–378 (August 2004)Google Scholar
  11. 11.
    Hou, F., Ho, P.H., Shen, X.S.: Performance evaluation for unsolicited grant service flows in 802.16 networks. In: Proceedings of the 2006 international conference on Wireless communications and mobile computing, Vancouver, British Columbia, Canada, pp. 991–996 (July 2006)Google Scholar
  12. 12.
    Baset, S.A., Schulzrinne, H.G.: An analysis of the skype peer-to-peer internet telephony protocol. In: Proceedings of the IEEE INFOCOM 2006, Barcelona, Spain, pp. 1–11 (2006)Google Scholar
  13. 13.
    Brady, P.: A model for generating on-off speech patterns in two-way conversation. The Bell System Technical Journal 48(9), 2445–2472 (1969)CrossRefGoogle Scholar
  14. 14.
    Stern, H.P., Wong, K.K.: A modified on-off model for conversational speech with short silence gaps. In: Proceedings of the 25th Southeastern Symposium on System Theory, Tuscaloosa, Alabama, USA, pp. 581–585 (1993)Google Scholar
  15. 15.
    International Telecommunication Union: Artificial conversational speech, ITU-T Recommendation P.59 (1993)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Chen-Chi Wu
    • 1
  • Kuan-Ta Chen
    • 2
  • Yu-Chun Chang
    • 1
  • Chin-Laung Lei
    • 1
  1. 1.Department of Electrical EngineeringNational Taiwan UniversityTaiwan
  2. 2.Institute of Information ScienceAcademia SinicaTaiwan

Personalised recommendations