Performance analysis on high -speed network for secure big data streaming of detecting VoIP calls


  • Rajinikanth E Sathyabama Institute of Science and Technology, chennai - 600119
  • Jayashri S Adhiparasakthi Engineering College, Melmaruvathur 603319





Intelligent Media Transfer, OWD (One Way Delay), VoIP, WLAN.


In this fast growing world, Internet-based Call transferring facilities are most popular and all the telecommunication industries are showing more interest in developing interesting key features and providing better solutions to the users. The detection of transmission and monitoring voice data causes lots of security issues and results in lacking over users to use the VoIP messages instead, of voice calls without an internet. Although there are many VoIP detecting techniques, they are not accurate and not efficient. This can be resolved by using AES algorithm which helps to transfer media files from one end to another end securely. In this approach, Big Data schemes are handled because of media-oriented handlings. This entire system deals with successful and intelligent communication over Internet-based Voice Call transmission. Some of the parameters used are transmission bit rate, speed, packet size, and intervals. Intelligent Media Packet transfer scheme is used for network analysis and route establishment. The proposed system outperforms the graphical representation of throughput, delay, and packet transmission speed. The main objective of this system is to efficiently process high-speed real-time network traffic, which proves that our approach of Intelligent Media Transfer (IMT) outperforms the existing systems with the ability to work in real-time and high-speed Big Data environment.



[1] Vegard Engen, "Machine learning for the network-based intrusion," Ph.D. dissertation, Bournemouth Univ., Poole, UK, 2010.

[2] S. Sagiroglu and D. Sinanc, "Big Data: a review," 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 42- 47, IEEE, 2013.

[3] M. M. U. Rathore and T. Mehmood, "Research on VoIP traffic detection," 2012 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Genoa, 2012, pp. 1-5.

[4] Bing Li, Shigang Jin, and Moade Ma, "VoIP Traffic Identification Based on Host and Flow Behavior Analysis," Journal of Network and Systems Management, Volume 19, 2010.

[5] ] Fauzia Idrees and Uzma Aslam Khan,"A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection," IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, pp 52- 59, 2008.

[6] Emanuel P. Freire, Artur Ziviani, and Ronaldo M. Salles, "Detecting VoIP Call Hidden in Web Traffic," IEEE transaction on network and service management, Vol no. 5, pp- 210-214, 2008

[7] Riyad Alshammari and Nur Zincir-Heywood, "can encrypted traffic be identified without port numbers, IP addresses, and payload inspection?'" ELSEVIER: Computer Networks, vol. 55, pp 1326-1350, 2011.

[8] T. Okabe, T. Kitamura, and T. Shizuno, "Statistical Traffic Identification Method Based on Flow-Level Behavior for Fair VoIP service," Proceedings of IEEE Workshop on VoIP Management and Security, pp. 35-40, 2006.

[9] Taner Yildirim and Dr. PJ Radcliffe, "VoIP Traffic Classification in IPsec Tunnels," 2010 International Conference on Electronics and Information Engineering (ICEIE), Koyoto, Japan, pp VI-151-VI-157, 2010.

[10] P. Branch and J. But, "Rapid and Generalized Identification of Packetized Packetized Voice Traffic Flows," 37th IEEE Conference on Local Computer Networks (LCN12), Clearwater, Florida, October 2012.


[12] F. Fusco and L. Deri, "High-Speed Network Traffic Analysis with Commodity Multi-core Systems," ACM IMC 2010, Nov. 2010. [13] Hadoop library to read packet capture (PCAP) files. "Available online:,†Accessed on 1 April 2016.

View Full Article: