Ontological approach in the using security system IP telephony

Authors

  • I.Eu. Romatets West Ukrainian National University

DOI:

https://doi.org/10.31649/1681-7893-2024-47-1-240-252

Keywords:

IP-telephony systems, VoIP, ontology, SpeechRecognition, information protection

Abstract

In today's information world, the use of VoIP has become an attractive option for user communication. With the downward trend in paying for basic broadband services and the rapid increase in internet speeds, the use of VoIP should only continue to grow in popularity. However, as the use of VoIP increases, so do the potential threats to ordinary users. This article examines the peculiarities of organizing corporate VoIP telephony systems, highlights the main problems in information protection systems in VoIP telephony, and outlines ways to solve them. The development of methods for speech analysis and corresponding processing of natural language, which allows for creating more accurate and effective systems for detecting anomalous traffic and potentially dangerous communications, is especially relevant. With the continuous development of artificial intelligence technologies, the direction of using intelligent means for content analysis in the VoIP system is becoming interesting. A method for detecting anomalies in IP-telephony traffic, based on grouping VoIP messages through context-frequency analysis, is proposed. Additionally, a method for automated filling of the ontology of thematic messages in corporate IP-telephony systems is proposed, based on the formalized presentation of messages using tree-like structures and the description of interaction operations through tuple algebra. Furthermore, a software implementation for converting voice messages into text representations using the SpeechRecognition library for voice-to-text conversion in the Python programming language was created. Experimental studies of the proposed approaches were conducted, and a software subsystem for detecting anomalous messages based on the ontological approach was implemented in the current corporate IP-telephony system.

Author Biography

I.Eu. Romatets, West Ukrainian National University

Senior Lecturer

References

Waleed Nazih, Alnowaiser Khaled, etc. "Detecting SPIT Attacks in VoIP Networks Using Convolutional Autoencoders: A Deep Learning Approach" Applied Sciences 13, no. 12: 6974, 2023. https://doi.org/10.3390/app13126974

Tuanhua L., "Interactive Behavior Analysis Based on Social Network," 2021 International Conference of Social Computing and Digital Economy (ICSCDE), 2021, pp. 188-191.

Pascual, S.; Bonafonte, A.; Serra, J. SEGAN: Speech Enhancement Generative Adversarial Network. In Proceedings of the 18th Annual Conference of the International Speech Communication Association (INTERSPEECH 2017), Stockholm, Sweden, 20–24 August 2017; pp. 3642–3646.

Hernes, M., Nguyen, N.T., Maleszka, M., Bytniewski, A. The automatic summarization of text documents in the cognitive integrated management information system (2015) Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015, art. No 8, pp. 1387-1396.

Dyvak, M., Papa, O., Melnyk, A., Pukas, A., Porplytsya, N., Rot, A. Interval model of the efficiency of the functioning of information web resources for services on ecological expertise (2020) Mathematics, 8 (12), art. no. 2116, pp. 1-12.

Glorot, X.; Bengio, Y. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, JMLR Workshop and Conference Proceedings, Sardinia, Italy, 13–15 May 2010; pp. 249–256

Alvares, C.; Dinesh, D.; Alvi, S.; Gautam, T.; Hasib, M.; Raza, A. Dataset of attacks on a live enterprise VoIP network for machine learning based intrusion detection and prevention systems. Comput. Netw. 2021, 197, 108283

Pereira, D.; Oliveira, R. Detection of Abnormal SIP Signaling Patterns: A Deep Learning Comparison. Computers 2022, 11, 27.

Ruff, L.; Kauffmann, J.R.; Vandermeulen, R.A.; Montavon, G.; Samek, W.; Kloft, M.; Dietterich, T.G.; Müller, K.R. A unifying review of deep and shallow anomaly detection. Proc. IEEE 2021, 109, 756–795.

Mohamed, Amira A., Amira Eltokhy, and Abdelhalim A. Zekry. 2023. "Enhanced Multiple Speakers’ Separation and Identification for VOIP Applications Using Deep Learning" Applied Sciences 13, no. 7: 4261. https://doi.org/10.3390/app13074261

Kafke, John, and Thiago Viana. 2022. "Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems" Network 2, no. 4: 545-567. https://doi.org/10.3390/network2040032

Ormazabal, G.; Sarvesh, N.; Eilon, Y.; Henning, S. Secure sip: A scalable prevention mechanism for dos attacks on sip based voip systems. In Proceedings of the International Conference on Principles, Systems and Applications of IP Telecommunications, Berlin/Heidelberg, Germany, 1–2 July 2008; pp. 107–132.

Cauteruccio, F.; Cinelli, L.; Corradini, E.; Terracina, G.; Ursino, D.; Virgili, L.; Savaglio, C.; Liotta, A.; Fortino, G. A framework for anomaly detection and classification in Multiple IoT scenarios. Future Gener. Comput. Syst. 2021, 114, 322–335.

Pasichnyk R. and Sachenko A., "Semantic WEB-Search Developing by Problem-Oriented Ontology Means," 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Dortmund, Germany, 2007, pp. 445-448, doi: 10.1109/IDAACS.2007.4488457.

Dyvak Mykola, Melnyk Andriy, Rot Artur, Hernes Marcin, Pukas Andriy, "Ontology of mathematical modelling based on interval data", Complexity, vol. 2022, Article ID 8062969, 24 p., 2022

Tas, I.M.; Unsalver, B.G.; Baktir, S. A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism. IEEE Access 2020, 8, 112574–112584.

Kovbasistyi, A. Melnyk, M. Dyvak, V. Brych and I. Spivak, "Method for detection of non-relevant and wrong information based on content analysis of web resources," 2017 XIIIth International Conference on 18.

Pasichnyk N.R. The method of forming ontological content based on the analysis of noisy, poorly structured information on specialized websites, Inductive modeling of complex systems. Collection of scientific works, Iss. No. 4, 2012, pp.158-168.

Pasichnyk N.R. The method of forming ontological content based on the analysis of information on specialized websites, Bulletin of the Khmelnytskyi National University: Technical Sciences, 2012. — Vol. No. 5. — P. 241-244.

Korel, Lukáš, Uladzislau Yorsh, Alexander S. Behr, Norbert Kockmann, and Martin Holeňa. 2023. "Text-to-Ontology Mapping via Natural Language Processing with Application to Search for Relevant Ontologies in Catalysis" Computers 12, no. 1: 14. https://doi.org/10.3390/computers12010014

Memariani, A.; Glauer, M.; Neuhaus, F.; Mossakowski, T.; Hatings, J. Automated and Explainable Ontology Extension Based on Deep Learning: A Case Study in the Chemical Domain. In Proceedings of the 3rd International Workshop on Data Meets Applied Ontologies, Hersonissos, Greece, 29 May–2 June 2021; pp. 1–16.

Downloads

Abstract views: 22

Published

2024-06-27

How to Cite

[1]
I. Romatets, “Ontological approach in the using security system IP telephony”, Опт-ел. інф-енерг. техн., vol. 47, no. 1, pp. 240–252, Jun. 2024.

Issue

Section

Fiber-Optical Technologies for Information (Internet, Intranet etc.) and Energy Networks

Metrics

Downloads

Download data is not yet available.