{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:20:02Z","timestamp":1760660402145,"version":"build-2065373602"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project","award":["PNURSP2025R746"],"award-info":[{"award-number":["PNURSP2025R746"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01129-6","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T12:43:09Z","timestamp":1758804189000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Misclassification in voice over internet protocol honeypots: distinguishing genuine calls from malicious traffic"],"prefix":"10.1007","volume":"24","author":[{"given":"Muhammad","family":"Muneeb","sequence":"first","affiliation":[]},{"given":"Ayesha","family":"Altaf","sequence":"additional","affiliation":[]},{"given":"Faiza","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Ayesha","family":"Afzaal","sequence":"additional","affiliation":[]},{"given":"Nagwan Abdel","family":"Samee","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"1129_CR1","unstructured":"Global Tech Stack: The Ultimate List of VoIP Statistics in 2025. Online (2025). https:\/\/www.globaltechstack.com\/voip-statistics\/"},{"key":"1129_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.jisa.2018.06.004","volume":"41","author":"M Baykara","year":"2018","unstructured":"Baykara, M., Das, R.: A novel honeypot based security approach for real-time intrusion detection and prevention systems. J Inf Security and Applications 41, 103\u2013116 (2018)","journal-title":"J Inf Security and Applications"},{"key":"1129_CR3","doi-asserted-by":"crossref","unstructured":"Prasad, S., Nahapetyan, A., Reaves, B.: Characterizing robocalls with multiple vantage points. arXiv preprint (2024) arXiv:2410.17361","DOI":"10.1109\/SP61157.2025.00096"},{"key":"1129_CR4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102758","volume":"119","author":"J Carrillo-Mond\u00e9jar","year":"2022","unstructured":"Carrillo-Mond\u00e9jar, J., Martinez, J.L., Suarez-Tangil, G.: On how voip attacks foster the malicious call ecosystem. Comput & Security 119, 102758 (2022)","journal-title":"Comput & Security"},{"key":"1129_CR5","first-page":"2175","volume":"8","author":"Z Zhigang","year":"2015","unstructured":"Zhigang, Z., Junqin, H.: An adaptive voice activity detection algorithm. Int J on Smart Sens and Intell Syst 8, 2175\u20132194 (2015)","journal-title":"Int J on Smart Sens and Intell Syst"},{"key":"1129_CR6","doi-asserted-by":"crossref","unstructured":"Nassar, M., State, R., Festor, O.: Voip honeypot architecture. In: Proceedings of the 10th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2007), pp. 109\u2013118 (2007)","DOI":"10.1109\/INM.2007.374775"},{"key":"1129_CR7","doi-asserted-by":"publisher","unstructured":"Li, H., Xu, X., Liu, C., Ren, T., Wu, K., Cao, X., Zhang, W., Yu, Y., Song, D.: A machine learning approach to prevent malicious calls over telephony networks. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 53\u201369. IEEE, ??? (2018) https:\/\/doi.org\/10.1109\/SP.2018.00034","DOI":"10.1109\/SP.2018.00034"},{"issue":"3","key":"1129_CR8","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/TIFS.2016.2632071","volume":"12","author":"D Golait","year":"2016","unstructured":"Golait, D., Hubballi, N.: Detecting anomalous behavior in voip systems: a discrete event system modeling. IEEE Trans. Inf. Forensics Secur. 12(3), 730\u2013745 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1129_CR9","unstructured":"Prasad, S., Sundaresan, N., Brown, A., Smith, J.: Diving into robocall content with snorcall. In: USENIX Security Symposium, pp. 344\u2013360. USENIX, ??? (2023)"},{"issue":"2","key":"1129_CR10","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/SURV.2011.031611.00112","volume":"14","author":"AD Keromytis","year":"2011","unstructured":"Keromytis, A.D.: A comprehensive survey of voice over ip security research. IEEE Commun Surv & Tutor 14(2), 514\u2013537 (2011)","journal-title":"IEEE Commun Surv & Tutor"},{"key":"1129_CR11","unstructured":"Ara\u00fajo, G.: Habilita\u00e7\u00e3o de reconhecimento de fala num servidor de media e controlo avan\u00e7ado de chamadas. Master\u2019s thesis, Instituto Politecnico do Porto (Portugal) (2024)"},{"key":"1129_CR12","unstructured":"Asterisk Documentation Team: Getting Started with ARI. https:\/\/docs.asterisk.org\/Configuration\/Interfaces\/Asterisk-REST-Interface-ARI\/Getting-Started-with-ARI\/. Accessed: 2025-03-09"},{"key":"1129_CR13","unstructured":"GeeksforGeeks: Node.js UDP\/DataGram Module - GeeksforGeeks. https:\/\/www.geeksforgeeks.org\/node-js-udp-datagram-module"},{"key":"1129_CR14","unstructured":"Areo, G.: Intrusion detection systems (IDS) for securing Asterisk-based VoIP networks (2024)"},{"key":"1129_CR15","doi-asserted-by":"crossref","unstructured":"Doris, S., Salem, I., Schmid, S.: Anomaly detection within mission-critical call processing. arXiv preprint arXiv:2408.14599 (2024)","DOI":"10.1007\/978-3-031-74498-3_23"},{"key":"1129_CR16","unstructured":"Introducing RTP: The Packet Format. https:\/\/blog.webex.com\/engineering\/introducing-rtp-the-packet-format\/"},{"issue":"6","key":"1129_CR17","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.3390\/s20061637","volume":"20","author":"W Song","year":"2020","unstructured":"Song, W., Beshley, M., Przystupa, K., Beshley, H., Kochan, O., Pryslupskyi, A., Pieniak, D., Su, J.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sens 20(6), 1637 (2020)","journal-title":"Sens"},{"issue":"1","key":"1129_CR18","doi-asserted-by":"crossref","first-page":"20060","DOI":"10.1038\/s41598-024-70983-6","volume":"14","author":"AO Salau","year":"2024","unstructured":"Salau, A.O., Beyene, M.M.: Software defined networking based network traffic classification using machine learning techniques. Sci. Rep. 14(1), 20060 (2024)","journal-title":"Sci. Rep."},{"issue":"3","key":"1129_CR19","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MIC.2002.1003132","volume":"6","author":"H Melvin","year":"2002","unstructured":"Melvin, H., Murphy, L.: Time synchronization for voip quality of service. IEEE Internet Comput. 6(3), 57\u201363 (2002)","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"1129_CR20","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/LNET.2020.2984721","volume":"2","author":"E Cipressi","year":"2020","unstructured":"Cipressi, E., Merani, M.L.: An effective machine learning (ml) approach to quality assessment of voice over ip (voip) calls. IEEE Netw Lett 2(2), 90\u201394 (2020)","journal-title":"IEEE Netw Lett"},{"key":"1129_CR21","unstructured":"Prasad, S., Bouma-Sims, E., Mylappan, A.K., Reaves, B.: Who\u2019s calling? characterizing robocalls through audio and metadata analysis, 397\u2013414 (2020)"},{"key":"1129_CR22","unstructured":"C\u0103runtu, A., Toderean, G., Nica, A.: Voicestudio: A hmm-based tool for research and teaching in the speech recognition field"},{"key":"1129_CR23","unstructured":"Sutarto, H., Joelianto, E.: Expectation-maximization based parameter identification for hmm of urban traffic flow. Int J Appl Math & Stat 53(2), 90\u2013101 (2015)"},{"key":"1129_CR24","doi-asserted-by":"crossref","unstructured":"Inibhunu, C., McGregor, C.A.: State based hidden markov models for temporal pattern discovery in critical care, 77\u201380 (2018)","DOI":"10.1109\/LSC.2018.8572190"},{"key":"1129_CR25","doi-asserted-by":"publisher","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session initiation protocol (3261) (2002) https:\/\/doi.org\/10.17487\/RFC3261","DOI":"10.17487\/RFC3261"},{"key":"1129_CR26","doi-asserted-by":"crossref","unstructured":"Zanuttini, D., Andres, C., Gonzalez, J., Lacapmesure, A., Priano, D., Pucci, N., Bullian, P.: Using software defined networking for call admission control and voip applications. In: 2018 Congreso Argentino de Ciencias de la Inform\u00e1tica Y Desarrollos de Investigaci\u00f3n (CACIDI), pp. 1\u20135. IEEE, ??? (2018)","DOI":"10.1109\/CACIDI.2018.8584371"},{"key":"1129_CR27","unstructured":"VoIPmonitor: Silence detection in voip traffic. VoIPmonitor Documentation (2021)"},{"issue":"18","key":"1129_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/16432-5600","volume":"93","author":"H Sukhwani","year":"2014","unstructured":"Sukhwani, H., Sharma, V., Sharma, S.: A survey of anomaly detection techniques and hidden markov model. Int J Comp Applications 93(18), 1\u20137 (2014)","journal-title":"Int J Comp Applications"},{"key":"1129_CR29","doi-asserted-by":"publisher","unstructured":"Nassar, M., State, R., Festor, O.: Voip honeypot architecture. IEEE International Conference on Communications, 109\u2013116 (2007) https:\/\/doi.org\/10.1109\/ICC.2007.10","DOI":"10.1109\/ICC.2007.10"},{"key":"1129_CR30","doi-asserted-by":"publisher","unstructured":"Jin, S., Seo, D., Kim, J.: Detecting anomaly traffic using flow data in the real voip network. International Conference on Information Networking, 1\u20135 (2010) https:\/\/doi.org\/10.1109\/ICOIN.2010.5598131","DOI":"10.1109\/ICOIN.2010.5598131"},{"key":"1129_CR31","unstructured":"Wikipedia: Voice activity detection. Wikipedia Online Encyclopedia (2022)"},{"key":"1129_CR32","doi-asserted-by":"crossref","unstructured":"Nakorji, U.H., Adedokun, E.A., Umoh, I.J., Shettima, A.: Mitigating coordinated call attacks on voip networks using hidden markov model. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 4(4), 337\u2013344 (2019)","DOI":"10.22219\/kinetik.v4i4.797"},{"issue":"1","key":"1129_CR33","first-page":"1404","volume":"29","author":"H Dinkel","year":"2021","unstructured":"Dinkel, H., Hsu, W.-N., Chang, S.Y.: Voice activity detection in the wild: a data-driven approach using teacher-student training. IEEE\/ACM Transn Audio, Speech, and Lang Process 29(1), 1404\u20131418 (2021)","journal-title":"IEEE\/ACM Transn Audio, Speech, and Lang Process"},{"key":"1129_CR34","doi-asserted-by":"crossref","unstructured":"Xu, M., Zhou, Y., Wu, J.: A lightweight framework for online voice activity detection in the wild. Proceedings of the 22nd Annual Conference of the International Speech Communication Association (INTERSPEECH 2021) 1(1), 3665\u20133669 (2021)","DOI":"10.21437\/Interspeech.2021-1977"},{"issue":"3","key":"1129_CR35","first-page":"191","volume":"1","author":"SJ Young","year":"2008","unstructured":"Young, S.J.: The application of hidden markov models in speech recognition. Found and Trends Signal Process 1(3), 191\u2013442 (2008)","journal-title":"Found and Trends Signal Process"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01129-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01129-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01129-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:56Z","timestamp":1760614736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01129-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1129"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01129-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"11 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"215"}}