{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:27:15Z","timestamp":1774448835271,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08088-w","type":"journal-article","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T22:02:40Z","timestamp":1567634560000},"page":"603-631","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An empirical approach towards characterization of encrypted and unencrypted VoIP traffic"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9536-037X","authenticated-orcid":false,"given":"Paromita","family":"Choudhury","sequence":"first","affiliation":[]},{"given":"K. R. Prasanna","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]},{"given":"G.","family":"Athithan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,4]]},"reference":[{"issue":"1","key":"8088_CR1","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.jksuci.2014.03.013","volume":"27","author":"R Alshammari","year":"2015","unstructured":"Alshammari R, Zincir-Heywood AN (2015) Identification of VoIP encrypted traffic using a machine learning approach. Journal of King Saud University \u2013 Computer and Information Sciences 27(1):77\u201392","journal-title":"Journal of King Saud University \u2013 Computer and Information Sciences"},{"key":"8088_CR2","doi-asserted-by":"crossref","unstructured":"Andersen S, Duric A, Astrom H, Hagen R, Kleijn W and Linden J (2004) Internet Low Bit Rate Codec (iLBC). RFC 3951","DOI":"10.17487\/rfc3951"},{"key":"8088_CR3","unstructured":"Andersen S, Kleijn W, Hagen R, Linden J, Murthi M, Skoglund J (2002) iLBC-a linear predictive coder with robustness to packet losses. In Proceedings of IEEE Speech Coding Workshop, Ibaraki"},{"key":"8088_CR4","doi-asserted-by":"crossref","unstructured":"L. Bassham, A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, N. Heckert and J. Dray (2010) A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Report no. 800\u201322 Rev 1a. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-22\/rev-1a\/final","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"8088_CR5","doi-asserted-by":"crossref","unstructured":"Baugher M, McGrew D, Naslund M, Carrara E, Norrman K (2004) The secure real-time transport protocol (SRTP). RFC 3711","DOI":"10.17487\/rfc3711"},{"issue":"11","key":"8088_CR6","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TIFS.2019.2911156","volume":"14","author":"Fran Casino","year":"2019","unstructured":"Casino F, Choo KR, Patsakis C (2019) HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets. arXiv Preprint arXiv :1905.11873v","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"8088_CR7","first-page":"44","volume":"2","author":"W Chang","year":"2010","unstructured":"Chang W, Fang B, Yun X, Wang S, Yu X (2010) Randomness testing of compressed data. J Comput 2(1):44\u201352","journal-title":"J Comput"},{"key":"8088_CR8","doi-asserted-by":"crossref","unstructured":"P. Choudhury, K. R. Prasanna Kumar, Athithan G and S Nandi (2013) Analysis of VBR coded VoIP for traffic classification. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Mysore, pp. 90\u201395","DOI":"10.1109\/ICACCI.2013.6637152"},{"key":"8088_CR9","unstructured":"Digital cellular telecommunications system (Phase 2+); Full rate speech; Processing functions GSM 06.01, version 6.0.1 Release 1997"},{"key":"8088_CR10","doi-asserted-by":"crossref","unstructured":"Dorfinger P, Panholzer G, John W (2011) Entropy estimation for real-time encryptrd traffic identification. International workshop on traffic monitoring and analysis, pp 164\u2013171","DOI":"10.1007\/978-3-642-20305-3_14"},{"issue":"4","key":"8088_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TNSM.2009.041102","volume":"5","author":"EP Freire","year":"2008","unstructured":"Freire EP, Ziviani A, Salles RM (2008) Detecting VoIP Calls Hidden in Web Traffic. IEEE Trans Netw Serv Manag 5(4):204\u2013214","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"8088_CR12","doi-asserted-by":"crossref","unstructured":"Gomes J, Inacio P, Pereira M, Freire M, Monteiro P (2012) Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties. IEEE Transaction on Parallel and Distributed Systems PP(99)","DOI":"10.1109\/TPDS.2012.316"},{"key":"8088_CR13","unstructured":"Hahn D, Apthorpe N, Feamster N (2018) Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices arXiv preprint arXiv:1805.02722"},{"issue":"2","key":"8088_CR14","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 29(2):147\u2013160","journal-title":"Bell Syst Tech J"},{"key":"8088_CR15","unstructured":"Hayden J (2007) Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools. Master Thesis"},{"key":"8088_CR16","doi-asserted-by":"crossref","unstructured":"Herlein G, Valin J, Heggestad A, Moizard A (2009) RTP Payload Format for the Speex Codec\u201d, rfc 5574","DOI":"10.17487\/rfc5574"},{"key":"8088_CR17","unstructured":"ITU-T (1996). Coding of Speech at 8 kbit\/s Using Conjugate-Structure Algebraic-Code-Excited Linear-Prediction (CS-ACELP), Technical Report G.729, International Telecommunications Union, Geneva"},{"key":"8088_CR18","unstructured":"ITU-T Recommendation G.711 (1988) Pulse Code Modulation (PCM) of Voice Frequencies. Available: https:\/\/www.itu.int\/rec\/T-REC-G.711-198811-I\/en"},{"issue":"12","key":"8088_CR19","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1016\/j.comnet.2009.03.010","volume":"53","author":"S Karapantazis","year":"2009","unstructured":"Karapantazis S, Pavlidou FN (2009) VoIP: a comprehensive survey on a promising technology. Journal of Computer Networks 53(12):2050\u20132090","journal-title":"Journal of Computer Networks"},{"key":"8088_CR20","volume-title":"The art of Comuper Programming, Vol. 2: Seminumerical Algorithms","author":"DE Knuth","year":"1969","unstructured":"Knuth DE (1969) The art of Comuper Programming, Vol. 2: Seminumerical Algorithms. Addison-Wesley, Menlo Park"},{"key":"8088_CR21","first-page":"781","volume-title":"Markov chain fingerprinting to classify encrypted traffic","author":"M Korczynski","year":"2014","unstructured":"Korczynski M, Duda A (2014) Markov chain fingerprinting to classify encrypted traffic. Proceedings of IEEE INFOCOM, Toronto, pp 781\u2013789"},{"key":"8088_CR22","doi-asserted-by":"crossref","unstructured":"Kumano Y, Ata S, Nakamura N, Nakahira Y, Oka I (2014) Towards real-time processing for application identification of encrypted traffic. In International conference on computing networking and communications (ICNC), Honolulu:136\u2013140","DOI":"10.1109\/ICCNC.2014.6785319"},{"key":"8088_CR23","unstructured":"LeGrand T, Jones P, Huart P, Shabestary T, Alvestrand H (2013) RTP payload Format for iSAC Codec. draft-ietf-avt-rtp-isac-04"},{"issue":"1","key":"8088_CR24","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10922-010-9184-7","volume":"19","author":"B Li","year":"2011","unstructured":"Li B, Ma M, Jin Z (2011) A VoIP Traffic Identification Scheme Based on Host and Flow Behavior Analysis. J Netw Syst Manag 19(1):111\u2013129","journal-title":"J Netw Syst Manag"},{"issue":"10","key":"8088_CR25","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/35.874981","volume":"38","author":"H Liu","year":"2000","unstructured":"Liu H, Mouchtaris P (2000) Voice over IP Signaling: H. 323 and Beyond. IEEE Commun Mag 38(10):142\u2013148","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"8088_CR26","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MIC.2012.115","volume":"16","author":"S Loreto","year":"2012","unstructured":"Loreto S, Romano SP (2012) Real-Time Communications in the Web: Issues, Achievements, and Ongoing Standardization Efforts. IEEE Internet Comput 16(5):68\u201373","journal-title":"IEEE Internet Comput"},{"key":"8088_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00500-018-3530-1","volume":"23","author":"M Lotfollahi","year":"2019","unstructured":"Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2019) Deep packet: A novel approach for encrypted traffic classification using deep learning. Journal of Soft Computing 23:1\u201314","journal-title":"Journal of Soft Computing"},{"key":"8088_CR28","unstructured":"P. Malhotra (2007) Detection of encrypted streams for egress monitoring. Masters Thesis, Iowa State University"},{"issue":"3","key":"8088_CR29","first-page":"219","volume":"13","author":"K Marton","year":"2010","unstructured":"Marton K, Suciu A, Ignat I (2010) Randomness in Digital Cryptography: A Survey. Romanian J Inf Sci Technol 13(3):219\u2013240","journal-title":"Romanian J Inf Sci Technol"},{"issue":"11\u201312","key":"8088_CR30","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/BF02996411","volume":"51","author":"K Ouaissa","year":"1996","unstructured":"Ouaissa K, Khalfaoui M, Bellanger M (1996) Combining speech coders and entropy coders to reduce the bit rate in the compression of speech. Journal of Ann Telecommun 51(11\u201312):595\u2013601","journal-title":"Journal of Ann Telecommun"},{"key":"8088_CR31","unstructured":"Parsons C (2013) Deep Packet Inspection and its Predecessors\u201d, Technology, Thoughts, and Trinkets. Available: https:\/\/www.christopher-parsons.com\/Main\/wp-content\/uploads\/2013\/02\/DPI-and-Its-Predecessors-3.5.pdf"},{"key":"8088_CR32","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.diin.2013.08.004","volume":"10","author":"P Penrose","year":"2013","unstructured":"Penrose P, Macfarlane R, Buchanan WJ (2013) Approaches to the classification of high entropy file fragments. Journal Digital Investigation 10:372\u2013384","journal-title":"Journal Digital Investigation"},{"key":"8088_CR33","doi-asserted-by":"crossref","unstructured":"Rosenberg J, Schulzrinne H, Camarillo G, Johston A, Peterson J, Sparks R, Handley M, Schooler E (2002) SIP: Session Initiation Protocol. RFC 3261","DOI":"10.17487\/rfc3261"},{"key":"8088_CR34","doi-asserted-by":"crossref","unstructured":"H. Schulzrinne and S. Casner (2003) RTP Profile for Audio and Video Conference with Minimal Control. RFC 3551","DOI":"10.17487\/rfc3551"},{"key":"8088_CR35","doi-asserted-by":"crossref","unstructured":"Schulzrinne H, Casner S, Frederick R, Jacobson V (2003) RTP: A Transport Protocol for Real-Time Applications. RFC 3550","DOI":"10.17487\/rfc3550"},{"key":"8088_CR36","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"8","key":"8088_CR37","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.1109\/TIFS.2017.2692682","volume":"12","author":"M Shen","year":"2017","unstructured":"Shen M, Wei M, Zhu L, Wang M (2017) Classification of encrypted traffic with second-order markov chains and application attribute bigrams. IEEE Transactions on Information Forensics and Security 12(8):1830\u20131843","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8088_CR38","unstructured":"Skype SILK Data Sheet. https:\/\/web.archive.org\/web\/20111123141335\/http:\/\/developer.skype.com\/resources\/SILKDataSheet.pdf"},{"key":"8088_CR39","doi-asserted-by":"crossref","unstructured":"Soto J (1999) Randomness Testing of the Advanced Encryption Standard Candidate Algorithms. NIST IR 6390","DOI":"10.6028\/NIST.IR.6390"},{"key":"8088_CR40","doi-asserted-by":"crossref","unstructured":"Sun L, Mkwawa IH, Jammeh E, Ifeachor E (2013) Guide to Voice and Video over IP. Computer Communications and Networks, 10.1007\/978-1-4471-4905-7_2, \u00a9 Springer-Verlag London","DOI":"10.1007\/978-1-4471-4905-7"},{"key":"8088_CR41","unstructured":"Valin JM (2006) Speex: A free codec for free speech. In Proceedings Linux Conference, Australia"},{"key":"8088_CR42","unstructured":"Valin JM, Vos K, Terriberry T (2012) Definition of the Opus Audio Codec. RFC 6716"},{"issue":"5","key":"8088_CR43","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1002\/nem.1901","volume":"25","author":"P Velan","year":"2015","unstructured":"Velan P, Cermak M, Celeda P, Drasar M (2015) A survey of methods for encrypted traffic classification and analysis. Int J Netw Manag 25(5):355\u2013374","journal-title":"Int J Netw Manag"},{"key":"8088_CR44","unstructured":"Vos K, Jensen S, Soerensen K (2010) SILK Speech Codec. draft-vos-silk-02"},{"key":"8088_CR45","unstructured":"Walker J. Pseudorandom Number Sequence Test Program. [Online] Fourmilab.ch. Available at: https:\/\/www.fourmilab.ch\/random\/ [Accessed 12 Feb. 2019]."},{"key":"8088_CR46","doi-asserted-by":"crossref","unstructured":"Zhao B, Liu Q, Liu X (2011) Evaluation of Encrypted Data Identification Methods Based on Randomness Test. IEEE\/ACM International Conference on Green Computing and Communications, Sichan","DOI":"10.1109\/GreenCom.2011.41"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08088-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08088-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08088-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T14:14:35Z","timestamp":1664288075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08088-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,4]]},"references-count":46,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8088"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08088-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,4]]},"assertion":[{"value":"9 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}