VoIP traffic classification in IPSec tunnels

@article{Yildirim2010VoIPTC,
  title={VoIP traffic classification in IPSec tunnels},
  author={Taner Yildirim and P. J. Radcliffe},
  journal={2010 International Conference on Electronics and Information Engineering},
  year={2010},
  volume={1},
  pages={V1-151-V1-157}
}
  • Taner Yildirim, P. J. Radcliffe
  • Published in
    International Conference on…
    2010
  • Computer Science
  • Research in traffic classification has become more challenging with the emergence of new applications and new ways to hide the true nature of traffic. The accuracy of traffic identification methods has also become more important due to the greater use of delay sensitive applications such as VoIP and video over IP which need to be identified and given priority. Traditional techniques such as header and payload inspection are not providing sufficient information to identify traffic types due to… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 18 CITATIONS

    Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification

    VIEW 4 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    QoS Improvement Analysis of VoIP Service Which Uses Overlay Network. Case Study: Calling AWS VoIP Gateway From Bandung, Indonesia

    VIEW 7 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Research on VoIP traffic detection

    • M. Mazhar Rathore, Tahir Mehmood
    • Computer Science
    • 2012 International Symposium on Performance Evaluation of Computer & Telecommunication Systems (SPECTS)
    • 2012
    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    A Real-Time Identification System for VoIP Traffic in Large-Scale Networks

    • Rongkang Wang, Jianzhong Zhang, Yu Zhang, Mingxin Yin, Jingdong Xu
    • Computer Science
    • 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
    • 2019
    VIEW 1 EXCERPT
    CITES BACKGROUND

    Deep learning-based real-time VPN encrypted traffic identification methods

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Modeling and Monitoring Wi-Fi Calling Traffic in Enterprise Networks Using Machine Learning

    VIEW 1 EXCERPT
    CITES RESULTS

    High-Speed Network Traffic Analysis: Detecting VoIP Calls in Secure Big Data Streaming

    VIEW 3 EXCERPTS
    CITES METHODS

    A high performance VoLTE traffic classification method using HTCondor

    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 17 REFERENCES

    A Machine Learning Approach for Efficient Traffic Classification

    • A.W.M.W. Li
    • Proceedings of IEEE MASCOTS 2007, pp. 310- 317, 2007.
    • 2007
    VIEW 1 EXCERPT

    A flow based approach for SSH traffic detection

    VIEW 1 EXCERPT

    Automated traffic classification and application identification using machine learning

    VIEW 1 EXCERPT