Figures index

From

Identification of Hidden VoIP (Grey Traffic)

Ch. M. Asim Rasheed, Ayesha Khaliq, Ammara Sajid, Sana Ajmal

Journal of Computer Networks. 2013, 1(2), 15-27 doi:10.12691/jcn-1-2-1
  • Figure 1. Normal VoIP Flow
  • Figure 2. Isolated Control Traffic VoIP Flow
  • Figure 3. Encrypted VoIP Flow
  • Figure 4. Multiple uni-directional VoIP Flow
  • Figure 6. Output for Module-4
  • Figure 7. Graph for the Data Flow and Session against Time Showing Behavior of the Non-suspicious Traffic
  • Figure 8. Graph for the Payload and Session against Time Showing Behavior of Moderate Suspicious Traffic
  • Figure 9. Graph for the Payload and Sessions against Time Showing Behavior of Grey Traffic