Sciweavers

CNSM
2010

An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype

13 years 9 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opportunity to decompose the original problem into a subset of classifiers with non-overlapping behaviors, in effect providing further insight into the problem domain. Thus, the objective of this work is to classify VoIP encrypted traffic, where Gtalk and Skype applications are taken as good representatives. To this end, three different machine learning based approaches, namely, C4.5, AdaBoost and Genetic Programming (GP), are evaluated under data sets common and independent from the training condition. In this case, flow based features are employed without using the IP addresses, source/destination ports and payload information. Results indicate that C4.5 based machine learning approach has the best performance.
Riyad Alshammari, A. Nur Zincir-Heywood
Added 10 Feb 2011
Updated 10 Feb 2011
Type Journal
Year 2010
Where CNSM
Authors Riyad Alshammari, A. Nur Zincir-Heywood
Comments (0)