IMPLEMENTING SVM AND ISOLATION FOREST IN DETECTING AND RESOLVING SIP TRUNK ISSUES
DOI:
https://doi.org/10.29121/shodhai.v2.i2.2025.60Keywords:
Sip Trunk, Anomaly Detection, Isolation Forest, One-Class SVM, Contact Center, MTTD, MTTR, Automated Monitoring, ISO/IEC 25010Abstract
The rise of Session Initiation Protocol (SIP) trunks has significantly enhanced voice communications in contact centers, offering benefits such as cost efficiency and scalability. However, these advancements also introduce technical challenges like call drops and network disruptions. Traditional manual detection methods delay issue resolution, resulting in prolonged downtimes and reduced service quality. This study identifies a critical gap: the need for proactive, real-time monitoring tools to detect and resolve SIP trunk issues before they impact users. To address this gap, the Automated SIP Trunk Guardian (ASTG) was developed, integrating machine learning algorithms such as Isolation Forest and One-Class Support Vector Machines (SVM) along with natural language processing (NLP) to automate detection and visualization of anomalies. The system was evaluated using 160 SIP incident samples and expert feedback guided by ISO/IEC 25010. Results demonstrated significant improvements over manual detection, including reduced mean time to detect (MTTD) and mean time to resolve (MTTR), increased precision, recall, and F-measure. This study contributes a practical, operationally validated framework for SIP trunk anomaly detection in contact centers, offering measurable improvements in service reliability and efficiency.
References
Alghushairy, O., Alsini, R., Alhassan, Z., Alshdadi, A. A., Banjar, A., Yafoz, A., and Ma, X. (2024). An Efficient Support Vector Machine Algorithm-Based Network Outlier Detection System. IEEE Access, 12, 24428–24441. https://doi.org/10.1109/ACCESS.2024.3363609
Alkhabbas, F., Munir, H., Spalazzese, R., and Davidsson, P. (2025). Quality Characteristics in IOT Systems: Learnings from an Industry Multi-Case Study. Discover Internet of Things, 5(1), 13.
Arman, M. (2019). Perbandingan Performansi Single Web Server Dan Multi Web Server Dengan Uji Coba Paired Sample T Test. Jurnal Sisfokom (Sistem Informasi dan Komputer), 8(2), 116–123. https://doi.org/10.32736/sisfokom.v8i2.668
Arora, A., and Garg, A. (2022). Anomaly Detection Using Deep Learning: A Systematic Review. Applied Artificial Intelligence, 36(1), 2034102. https://doi.org/10.1080/08839514.2022.2034102
Averineni, A. (2025). Leveraging Machine Learning for Anomaly Detection in Telecom Network Management. Journal of Computer Science and Technology Studies, 7(4), 8–20.
Blue Goat Cyber. (2023). Network Troubleshooting With Wireshark: A Comprehensive Study. Journal of Network and Systems Management, 31(2), 145–162.
Botvinko, A. Y., and Samouylov, K. E. (2021). Evaluation of the Firewall Influence on the Session Initiation by the SIP Multimedia Protocol. Discrete and Continuous Models and Applied Computational Science, 29(3), 221–229.
Catillo, M., Pecchia, A., and Villano, U. (2022). AutoLog: Anomaly Detection by Deep Autoencoding of System Logs. Expert Systems with Applications, 191, 116263.
Chalapathy, R., and Chawla, S. (2021). Deep Learning for Anomaly Detection: A Survey. ACM Computing Surveys, 54(3), 1–38. https://doi.org/10.1145/3439950
Cristian, S., Gabriel, M. E., Gabriel, P., Denisa, C. L., Nicoleta, A., and Constantin, P. D. (2023, June). VoIP System for Wi-Fi Networks and Smart Terminals. In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (1–6). IEEE. https://doi.org/10.1109/ECAI58194.2023.10194061
Daba, G. (2022). Quality of Service Comparison of Seamless Multi-Protocol Level Switching and Multi-Protocol Level Switching Networks (Doctoral Dissertation, St. Mary’s University).
Dastagiraiah, D. (2024). A System for Analysing Call Drop Dynamics in the Telecom Industry Using Machine Learning and Feature Selection. Journal of Theoretical and Applied Information Technology, 102(22).
Delavar, M., and Nabizadeh, M. (2021). AI-Driven Anomaly Detection Models in SIP Trunk Monitoring. Journal of Network and Systems Management, 29(3), 456–472.
Erbsen, A., Gruetter, S., Choi, J., Wood, C., and Chlipala, A. (2021, June). Integration Verification Across Software and Hardware for a Simple Embedded System. In Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation (604–619).
Evidently AI. (2023). Classification metrics: Accuracy, Precision, Recall.
Genesys. (2024). Speech analytics meets AI: A New Era in Quality Management.
Hariri, S., Kind, M. C., and Brunner, R. J. (2021). IEEE Transactions on Knowledge and Data Engineering, 33(4), 1479–1492. https://doi.org/10.1109/TKDE.2019.2947676
Hosseinzadeh, M., Rahmani, A. M., Vo, B., Bidaki, M., Masdari, M., and Zangakani, M. (2021). Improving Security Using Svm-Based Anomaly Detection: Issues and Challenges. Soft Computing, 25(4), 3195–3223. https://doi.org/10.1007/s00500-020-05373-x
Hussain, A., and Mkpojiogu, E. O. (2015). An Application of the ISO/IEC 25010 Standard in the Quality-in-use Assessment of an Online Health Awareness System. Jurnal Teknologi, 77(5), 9–13.
Korla, V. (2024, March 21). Tech Adoption Trends in the Contact Center. Forbes.
Lekshmy, V. G., Anusree, P. K., and Varunika, V. S. (2018, September). An Implementation of a Genetic Algorithm for Clustering Help Desk Data for Service Automation. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (952–956). IEEE. https://doi.org/10.1109/ICACCI.2018.8554532
Lesouple, J., Baudoin, C., Spigai, M., and Tourneret, J. Y. (2021). Generalized Isolation Forest for Anomaly Detection. Pattern Recognition Letters, 149, 109–119.
Li, Z., Zhang, J., Zhang, X., Lin, F., Wang, C., and Cai, X. (2022, June). Natural Language Processing-Based Model for Log Anomaly Detection. In 2022 IEEE 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI) (129–134). IEEE.
Ma, J., Liu, Y., Wan, H., and Sun, G. (2023). Automatic Parsing and Utilization of System Log Features in Log Analysis: A Survey. Applied Sciences, 13(8), 4930.
Naidu, G., Zuva, T., and Sibanda, E. M. (2023, April). A Review of Evaluation Metrics in Machine Learning Algorithms. In Computer Science Online Conference (15–25). Springer International Publishing. https://doi.org/10.1007/978-3-031-35314-7_2
Nedelkoski, S., Bogatinovski, J., Acker, A., Cardoso, J., and Kao, O. (2021). Self-Supervised Log Parsing. In Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, ECML PKDD 2020 (122–138). Springer International Publishing.
Nextiva. (2024). What is SIP Trunking? How it works, Benefits, and how to get it.
Nguyen, G., Dlugolinsky, S., Tran, V., and López García, Á. (2024). Network Security Aiops for Online Stream Data Monitoring. Neural Computing and Applications, 1–25.
Pidpalyi, O. (2024). Future prospects: AI and Machine Learning in Cloud-Based SIP Trunking. Вісник Черкаського державного технологічного університету. Технічні науки, 29(1), 24–35. https://doi.org/10.62660/bcstu/1.2024.24
Rafique, S. H., Abdallah, A., Musa, N. S., and Murugan, T. (2024). Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends. Sensors, 24(6), 1968. https://doi.org/10.3390/s24061968
Rahman, M. M., Nayeem, M. E. H., Ahmed, M. S., Tanha, K. A., Sakib, M. S. A., Uddin, K. M. M., and Babu, H. M. H. (2024). AirNet: Predictive Machine Learning Model for Air Quality Forecasting using Web Interface. Environmental Systems Research, 13(1), 44. https://doi.org/10.1186/s40068-024-00378-z
Ramdas, K., and Manickam, S. (2018). Manual Detection Inefficiencies in SIP Trunk Monitoring. Journal of Network and Systems Management, 26(2), 123–138
Ryciak, P., Wasielewska, K., and Janicki, A. (2022). Anomaly Detection in Log Files Using Selected Natural Language Processing Methods. Applied Sciences, 12(10), 5089.
Shi, W., Zhang, M., Zhang, R., Chen, S., and Zhan, Z. (2020). Change Detection Based on Artificial Intelligence: State-of-the-Art and Challenges. Remote Sensing, 12(10), 1688. https://doi.org/10.3390/rs12101688
Sufi, F. (2024). Generative Pre-Trained Transformer (GPT) in Research: A Systematic Review on Data Augmentation. Information, 15(2), 99. https://doi.org/10.3390/info15020099
Taylor, J., and Kobayashi, S. (2023). Synthetic Data Generation using Large Language Models: Applications and Challenges. Journal of Artificial Intelligence Research, 76, 123–145. https://doi.org/10.1613/jair.1.13715
Wang, X., Yang, X., Liang, X., Zhang, X., Zhang, W., and Gong, X. (2024). Combating Alert Fatigue with AlertPro: Context-Aware Alert Prioritization Using Reinforcement learning for multi-step attack detection. Computers and Security, 137, 103583.
Wenguang, L., and Song, H. (2021). The Need for Automated Solutions in SIP Trunk Monitoring. Telecommunications Review, 34(4), 89–102.
Xu, H., Pang, G., Wang, Y., and Wang, Y. (2023). Deep Isolation Forest for Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 35(12), 12591–12604. https://doi.org/10.1109/TKDE.2023.10108034
Zhukova, K. A. (2022). Model of VoIP Service for Private Business Based on Nextiva Business Phone System.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Rico Emmanuel P. Lausa Jr, Ria A. Sagum

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.



















