IMPLEMENTING SVM AND ISOLATION FOREST IN DETECTING AND RESOLVING SIP TRUNK ISSUES

Authors

  • Rico Emmanuel P. Lausa Jr Master of Science in Information Technology, Polytechnic University of the Philippines – Graduate School, Sta. Mesa Manila, Philippines
  • Ria A. Sagum Professor, Master of Computer Science, Polytechnic University of the Philippines, Philippines

DOI:

https://doi.org/10.29121/shodhai.v2.i2.2025.60

Keywords:

Sip Trunk, Anomaly Detection, Isolation Forest, One-Class SVM, Contact Center, MTTD, MTTR, Automated Monitoring, ISO/IEC 25010

Abstract

The rise of Session Initiation Protocol (SIP) trunks has significantly enhanced voice communications in contact centers, offering benefits such as cost efficiency and scalability. However, these advancements also introduce technical challenges like call drops and network disruptions. Traditional manual detection methods delay issue resolution, resulting in prolonged downtimes and reduced service quality. This study identifies a critical gap: the need for proactive, real-time monitoring tools to detect and resolve SIP trunk issues before they impact users. To address this gap, the Automated SIP Trunk Guardian (ASTG) was developed, integrating machine learning algorithms such as Isolation Forest and One-Class Support Vector Machines (SVM) along with natural language processing (NLP) to automate detection and visualization of anomalies. The system was evaluated using 160 SIP incident samples and expert feedback guided by ISO/IEC 25010. Results demonstrated significant improvements over manual detection, including reduced mean time to detect (MTTD) and mean time to resolve (MTTR), increased precision, recall, and F-measure. This study contributes a practical, operationally validated framework for SIP trunk anomaly detection in contact centers, offering measurable improvements in service reliability and efficiency.

References

Alghushairy, O., Alsini, R., Alhassan, Z., Alshdadi, A. A., Banjar, A., Yafoz, A., and Ma, X. (2024). An Efficient Support Vector Machine Algorithm-Based Network Outlier Detection System. IEEE Access, 12, 24428–24441. https://doi.org/10.1109/ACCESS.2024.3363609

Alkhabbas, F., Munir, H., Spalazzese, R., and Davidsson, P. (2025). Quality Characteristics in IOT Systems: Learnings from an Industry Multi-Case Study. Discover Internet of Things, 5(1), 13.

Arman, M. (2019). Perbandingan Performansi Single Web Server Dan Multi Web Server Dengan Uji Coba Paired Sample T Test. Jurnal Sisfokom (Sistem Informasi dan Komputer), 8(2), 116–123. https://doi.org/10.32736/sisfokom.v8i2.668

Arora, A., and Garg, A. (2022). Anomaly Detection Using Deep Learning: A Systematic Review. Applied Artificial Intelligence, 36(1), 2034102. https://doi.org/10.1080/08839514.2022.2034102

Averineni, A. (2025). Leveraging Machine Learning for Anomaly Detection in Telecom Network Management. Journal of Computer Science and Technology Studies, 7(4), 8–20.

Blue Goat Cyber. (2023). Network Troubleshooting With Wireshark: A Comprehensive Study. Journal of Network and Systems Management, 31(2), 145–162.

Botvinko, A. Y., and Samouylov, K. E. (2021). Evaluation of the Firewall Influence on the Session Initiation by the SIP Multimedia Protocol. Discrete and Continuous Models and Applied Computational Science, 29(3), 221–229.

Catillo, M., Pecchia, A., and Villano, U. (2022). AutoLog: Anomaly Detection by Deep Autoencoding of System Logs. Expert Systems with Applications, 191, 116263.

Chalapathy, R., and Chawla, S. (2021). Deep Learning for Anomaly Detection: A Survey. ACM Computing Surveys, 54(3), 1–38. https://doi.org/10.1145/3439950

Cristian, S., Gabriel, M. E., Gabriel, P., Denisa, C. L., Nicoleta, A., and Constantin, P. D. (2023, June). VoIP System for Wi-Fi Networks and Smart Terminals. In 2023 15th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (1–6). IEEE. https://doi.org/10.1109/ECAI58194.2023.10194061

Daba, G. (2022). Quality of Service Comparison of Seamless Multi-Protocol Level Switching and Multi-Protocol Level Switching Networks (Doctoral Dissertation, St. Mary’s University).

Dastagiraiah, D. (2024). A System for Analysing Call Drop Dynamics in the Telecom Industry Using Machine Learning and Feature Selection. Journal of Theoretical and Applied Information Technology, 102(22).

Delavar, M., and Nabizadeh, M. (2021). AI-Driven Anomaly Detection Models in SIP Trunk Monitoring. Journal of Network and Systems Management, 29(3), 456–472.

Erbsen, A., Gruetter, S., Choi, J., Wood, C., and Chlipala, A. (2021, June). Integration Verification Across Software and Hardware for a Simple Embedded System. In Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation (604–619).

Evidently AI. (2023). Classification metrics: Accuracy, Precision, Recall.

Genesys. (2024). Speech analytics meets AI: A New Era in Quality Management.

Hariri, S., Kind, M. C., and Brunner, R. J. (2021). IEEE Transactions on Knowledge and Data Engineering, 33(4), 1479–1492. https://doi.org/10.1109/TKDE.2019.2947676

Hosseinzadeh, M., Rahmani, A. M., Vo, B., Bidaki, M., Masdari, M., and Zangakani, M. (2021). Improving Security Using Svm-Based Anomaly Detection: Issues and Challenges. Soft Computing, 25(4), 3195–3223. https://doi.org/10.1007/s00500-020-05373-x

Hussain, A., and Mkpojiogu, E. O. (2015). An Application of the ISO/IEC 25010 Standard in the Quality-in-use Assessment of an Online Health Awareness System. Jurnal Teknologi, 77(5), 9–13.

Korla, V. (2024, March 21). Tech Adoption Trends in the Contact Center. Forbes.

Lekshmy, V. G., Anusree, P. K., and Varunika, V. S. (2018, September). An Implementation of a Genetic Algorithm for Clustering Help Desk Data for Service Automation. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (952–956). IEEE. https://doi.org/10.1109/ICACCI.2018.8554532

Lesouple, J., Baudoin, C., Spigai, M., and Tourneret, J. Y. (2021). Generalized Isolation Forest for Anomaly Detection. Pattern Recognition Letters, 149, 109–119.

Li, Z., Zhang, J., Zhang, X., Lin, F., Wang, C., and Cai, X. (2022, June). Natural Language Processing-Based Model for Log Anomaly Detection. In 2022 IEEE 2nd International Conference on Software Engineering and Artificial Intelligence (SEAI) (129–134). IEEE.

Ma, J., Liu, Y., Wan, H., and Sun, G. (2023). Automatic Parsing and Utilization of System Log Features in Log Analysis: A Survey. Applied Sciences, 13(8), 4930.

Naidu, G., Zuva, T., and Sibanda, E. M. (2023, April). A Review of Evaluation Metrics in Machine Learning Algorithms. In Computer Science Online Conference (15–25). Springer International Publishing. https://doi.org/10.1007/978-3-031-35314-7_2

Nedelkoski, S., Bogatinovski, J., Acker, A., Cardoso, J., and Kao, O. (2021). Self-Supervised Log Parsing. In Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, ECML PKDD 2020 (122–138). Springer International Publishing.

Nextiva. (2024). What is SIP Trunking? How it works, Benefits, and how to get it.

Nguyen, G., Dlugolinsky, S., Tran, V., and López García, Á. (2024). Network Security Aiops for Online Stream Data Monitoring. Neural Computing and Applications, 1–25.

Pidpalyi, O. (2024). Future prospects: AI and Machine Learning in Cloud-Based SIP Trunking. Вісник Черкаського державного технологічного університету. Технічні науки, 29(1), 24–35. https://doi.org/10.62660/bcstu/1.2024.24

Rafique, S. H., Abdallah, A., Musa, N. S., and Murugan, T. (2024). Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends. Sensors, 24(6), 1968. https://doi.org/10.3390/s24061968

Rahman, M. M., Nayeem, M. E. H., Ahmed, M. S., Tanha, K. A., Sakib, M. S. A., Uddin, K. M. M., and Babu, H. M. H. (2024). AirNet: Predictive Machine Learning Model for Air Quality Forecasting using Web Interface. Environmental Systems Research, 13(1), 44. https://doi.org/10.1186/s40068-024-00378-z

Ramdas, K., and Manickam, S. (2018). Manual Detection Inefficiencies in SIP Trunk Monitoring. Journal of Network and Systems Management, 26(2), 123–138

Ryciak, P., Wasielewska, K., and Janicki, A. (2022). Anomaly Detection in Log Files Using Selected Natural Language Processing Methods. Applied Sciences, 12(10), 5089.

Shi, W., Zhang, M., Zhang, R., Chen, S., and Zhan, Z. (2020). Change Detection Based on Artificial Intelligence: State-of-the-Art and Challenges. Remote Sensing, 12(10), 1688. https://doi.org/10.3390/rs12101688

Sufi, F. (2024). Generative Pre-Trained Transformer (GPT) in Research: A Systematic Review on Data Augmentation. Information, 15(2), 99. https://doi.org/10.3390/info15020099

Taylor, J., and Kobayashi, S. (2023). Synthetic Data Generation using Large Language Models: Applications and Challenges. Journal of Artificial Intelligence Research, 76, 123–145. https://doi.org/10.1613/jair.1.13715

Wang, X., Yang, X., Liang, X., Zhang, X., Zhang, W., and Gong, X. (2024). Combating Alert Fatigue with AlertPro: Context-Aware Alert Prioritization Using Reinforcement learning for multi-step attack detection. Computers and Security, 137, 103583.

Wenguang, L., and Song, H. (2021). The Need for Automated Solutions in SIP Trunk Monitoring. Telecommunications Review, 34(4), 89–102.

Xu, H., Pang, G., Wang, Y., and Wang, Y. (2023). Deep Isolation Forest for Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering, 35(12), 12591–12604. https://doi.org/10.1109/TKDE.2023.10108034

Zhukova, K. A. (2022). Model of VoIP Service for Private Business Based on Nextiva Business Phone System.

Downloads

Published

2025-12-30

How to Cite

Lausa Jr, R. E. P., & Sagum, R. A. (2025). IMPLEMENTING SVM AND ISOLATION FOREST IN DETECTING AND RESOLVING SIP TRUNK ISSUES. ShodhAI: Journal of Artificial Intelligence, 2(2), 48–56. https://doi.org/10.29121/shodhai.v2.i2.2025.60