A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages
The increased use of VoIP technology heightens the potential threats to ordinary users. This study examines the peculiarities of implementing corporate VoIP telephony systems, identifies the main problems in protecting information within such systems, and suggests solutions. Special attention is giv...
Saved in:
Published in | International Conference on Advanced Computer Information Technologies (Print) pp. 485 - 489 |
---|---|
Main Authors | , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
19.09.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2770-5226 |
DOI | 10.1109/ACIT62333.2024.10712505 |
Cover
Abstract | The increased use of VoIP technology heightens the potential threats to ordinary users. This study examines the peculiarities of implementing corporate VoIP telephony systems, identifies the main problems in protecting information within such systems, and suggests solutions. Special attention is given to the development of methods for speech analysis and natural language processing, enabling the creation of more accurate and effective systems for detecting anomalous traffic and potentially hazardous communications.An ontology for describing messages in VoIP IP telephony systems is proposed, formalizing main concepts as separate entities and detailing connections between them. The suggested method for detecting anomalies in IP telephony traffic relies on grouping VoIP messages through context-frequency analysis.Experimental studies of the proposed approaches were conducted, resulting in the implementation of a software subsystem for detecting anomalous messages based on the ontological approach in current corporate IP telephony systems. |
---|---|
AbstractList | The increased use of VoIP technology heightens the potential threats to ordinary users. This study examines the peculiarities of implementing corporate VoIP telephony systems, identifies the main problems in protecting information within such systems, and suggests solutions. Special attention is given to the development of methods for speech analysis and natural language processing, enabling the creation of more accurate and effective systems for detecting anomalous traffic and potentially hazardous communications.An ontology for describing messages in VoIP IP telephony systems is proposed, formalizing main concepts as separate entities and detailing connections between them. The suggested method for detecting anomalies in IP telephony traffic relies on grouping VoIP messages through context-frequency analysis.Experimental studies of the proposed approaches were conducted, resulting in the implementation of a software subsystem for detecting anomalous messages based on the ontological approach in current corporate IP telephony systems. |
Author | Yakymenko, Ihor Melnyk, Andriy Voznyak, Serhiy Luchyk, Vasyl Romanets, Ihor Shevchuk, Ruslan |
Author_xml | – sequence: 1 givenname: Andriy surname: Melnyk fullname: Melnyk, Andriy email: melnyk.andriy@gmail.com organization: Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine – sequence: 2 givenname: Ruslan surname: Shevchuk fullname: Shevchuk, Ruslan email: rsh@wunu.edu.ua organization: Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine – sequence: 3 givenname: Ihor surname: Romanets fullname: Romanets, Ihor email: i.romanets@wunu.edu.ua organization: Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine – sequence: 4 givenname: Ihor surname: Yakymenko fullname: Yakymenko, Ihor email: iyakymenko@ukr.net organization: Ukrainian National University,Department of Computer Science West,Ternopil,Ukraine – sequence: 5 givenname: Serhiy surname: Voznyak fullname: Voznyak, Serhiy email: sv@wunu.edu.ua organization: Ukrainian National University,Department of Cyber Security West,Ternopil,Ukraine – sequence: 6 givenname: Vasyl surname: Luchyk fullname: Luchyk, Vasyl email: luchik-vasil@ukr.net organization: Kharkiv National University of Internal Affairs,Department of Cybercrime Counteraction,Kharkiv,Ukraine |
BookMark | eNo1kM1qwzAQhNXSQtM0b1CoXsDpamVZ9tGkf4aU5GByDbJ-EpVECpEvefuqtIWBPQzz7e7ck5sQgyXkicGcMWie20XXV8g5nyNgOWcgGQoQV2TWyKbmArKg5NdkglJCIRCrOzJL6QsAOEKZvQnZtPTTjvtoaHT0xY5Wjz7saBviUR28TdQH2q3pep930_6snPOaDirZHAh0FcZ4iLvLT3gT_SmzUlI7mx7IrVOHZGd_c0r6t9d-8VEsV-_dol0WvmFj4ZirNNQ1SDSlrZ0YpBKaDdpJLGszGGPQoGU8H9xwiY2omNZuQCzzy07xKXn8xXpr7fZ09kd1vmz_m-DfkhlTdg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ACIT62333.2024.10712505 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350350043 |
EISSN | 2770-5226 |
EndPage | 489 |
ExternalDocumentID | 10712505 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i91t-f1f6c088072d4e8f5b7a5c1bcf7248dbddd2d2e1300393729561ccfb224202fa3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:16:04 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i91t-f1f6c088072d4e8f5b7a5c1bcf7248dbddd2d2e1300393729561ccfb224202fa3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10712505 |
PublicationCentury | 2000 |
PublicationDate | 2024-Sept.-19 |
PublicationDateYYYYMMDD | 2024-09-19 |
PublicationDate_xml | – month: 09 year: 2024 text: 2024-Sept.-19 day: 19 |
PublicationDecade | 2020 |
PublicationTitle | International Conference on Advanced Computer Information Technologies (Print) |
PublicationTitleAbbrev | ACIT |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003204043 |
Score | 1.8879422 |
Snippet | The increased use of VoIP technology heightens the potential threats to ordinary users. This study examines the peculiarities of implementing corporate VoIP... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 485 |
SubjectTerms | information protection Information technology IP networks Libraries Natural language processing Ontologies ontology Protection Python Software Speech analysis Telephony VoIP IP telephony systems |
Title | A Method of Detecting Anomalies in IP Phone Traffic based on Ontology of Voip Messages |
URI | https://ieeexplore.ieee.org/document/10712505 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI7YTpwAMcRbOXBtadO0aY7TYNqQGDuMabepeYkJ0U6sPcCvx84eCCQkblUtR5aj5EvizzYhNxlirHBRICOmA16kNsgNksZ5rrmKHIg9QXaUDZ75wyydbZLVfS6MtdaTz2yInz6Wbyrd4FMZrHARI2S3SEsIuU7W2j2oJCzCSjEbDlccydtubzgBdE8SuAYyHm61f_RR8TDSPyCjrQFr9shr2NQq1J-_ajP-28JD0vnO2KPjHRYdkT1bHpNplz76BtG0cvTOYrgAhBRu_G9w-rYruijpcEzHL1VpKYAWVpOgCGugUNKn0re2_UDlabVYwlgrZKGtOmTSv5_0BsGmj0KwkHEduNhlGjaTSDDDbe5SJYpUx0o7wXhulDGGGWYxroXV8RimumrtFIA7-M0VyQlpl2DIKaGFNrJgKlMp1yCEw4TUOdMmsjyVWiVnpIM-mS_XlTLmW3ec__H_guzj1CD_IpaXpF2_N_YKQL5W135yvwD046SE |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI5gHOAEiCHe5MC1pU3T13EaTBtsY4cy7TY1LzEh2om1B_j12NkDgYTErarlynKUfnH82SbkJkKMjY3npB6TDs9D7SQKSeM8kVx4BsSWIDuMus_8YRJOVsXqthZGa23JZ9rFR5vLV6Ws8aoMdnjsI2Rvk50Qwop4Wa61uVIJmIe9YlYsLt9Lb1vtXgb4HgQQCDLurvV_TFKxQNLZJ8O1CUv-yKtbV8KVn7-6M_7bxgPS_K7Zo6MNGh2SLV0ckXGLDuyIaFoaeqcxYQBCCjH_G5y_9YLOCtob0dFLWWgKsIX9JCgCGygU9Kmww20_UHlczubwrQXy0BZNknXus3bXWU1ScGapXznGN5GE34kXM8V1YkIR56H0hTQx44kSSimmmMbMFvbHY1jsKqURAO_gN5MHx6RRgCEnhOZSpTkTkQi5BCEcJ1KZMKk8zcNUiuCUNNEn0_myV8Z07Y6zP95fk91uNuhP-73h4znZw2VCNoafXpBG9V7rS4D8SlzZhf4Cy6-n1Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Advanced+Computer+Information+Technologies+%28Print%29&rft.atitle=A+Method+of+Detecting+Anomalies+in+IP+Phone+Traffic+based+on+Ontology+of+Voip+Messages&rft.au=Melnyk%2C+Andriy&rft.au=Shevchuk%2C+Ruslan&rft.au=Romanets%2C+Ihor&rft.au=Yakymenko%2C+Ihor&rft.date=2024-09-19&rft.pub=IEEE&rft.eissn=2770-5226&rft.spage=485&rft.epage=489&rft_id=info:doi/10.1109%2FACIT62333.2024.10712505&rft.externalDocID=10712505 |