2018
DOI: 10.1016/j.dsp.2017.10.009
|View full text |Cite
|
Sign up to set email alerts
|

A Bayesian change point model for detecting SIP-based DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 18 publications
0
18
0
Order By: Relevance
“…Kurt et al [ 10 ] extracted 41 features from SIP messages and resource usage measurements of the VoIP server to detect DDoS flooding attacks. Using a Hidden Markov Model (HMM), they related these features to hidden variables.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Kurt et al [ 10 ] extracted 41 features from SIP messages and resource usage measurements of the VoIP server to detect DDoS flooding attacks. Using a Hidden Markov Model (HMM), they related these features to hidden variables.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to previous machine learning approaches to DDoS detection such as those in [ 9 , 10 ], our method does not require designing features that represent SIP messages, as show in Figure 1 . The feature extraction process consists of tokenizing, converting to sequences, padding, and embedding.…”
Section: Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Min-max distribution free continuous-review model was presented with a service level constraint and variable lead time [26]. The Bayesian change point detection model was recommended to identify the flooding attacks in VoIP systems in which the Session Initiation Protocol (SIP) is used as a signaling mechanism [27].…”
Section: Related Literaturementioning
confidence: 99%
“…However, EM exhibits better performance in case of minor changes and unsuitable priors while the Bayesian method has less computational work to do (Keshavarz and Huang [20]). The Bayesian multiple change point model was suggested for the identification of Distributed Denial of Service (DDoS) flooding attacks in VoIP systems in which Session Initiation Protocol (SIP) is used as signalling mechanism (Kurt et al [21]). One of the well-known change detection techniques is post classification with multi temporal remote sensing images.…”
Section: Introductionmentioning
confidence: 99%