2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.205
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Detecting Anomalies in VoIP Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Niccolin first proposed a framework for snort-based intrusion detection and prevention prototype system that uses knowledge-based intrusion detection to detect SIP malformed messages and messages tampering [5]. Bouzida gathered several attributes from the VoIP attacks and SIP protocol itself, and an intrusion detection is analyzed by two types of extracted features using decision tree [6]. Geneiatakis analyzed several kinds of SIP malformed message attacks, and extracted SIP characteristics of the malformed message.…”
Section: Related Workmentioning
confidence: 99%
“…Niccolin first proposed a framework for snort-based intrusion detection and prevention prototype system that uses knowledge-based intrusion detection to detect SIP malformed messages and messages tampering [5]. Bouzida gathered several attributes from the VoIP attacks and SIP protocol itself, and an intrusion detection is analyzed by two types of extracted features using decision tree [6]. Geneiatakis analyzed several kinds of SIP malformed message attacks, and extracted SIP characteristics of the malformed message.…”
Section: Related Workmentioning
confidence: 99%
“…4) is composed of different SBCs (Session Border Controllers) that filter all the incoming traffic from Internet or legitimate clients. Since SBCs cannot filter all undesired traffic, VoIP intrusion detection system tools, such as that developed in [3], are deployed behind these SBCs to detect different attacks using some vulnerabilities of the SIP protocol. Other emerging VoIP IDSs [19], based on state machine analysis similar to previous works such as NetStat [22], may be used as a complementary IDS in our framework.…”
Section: Voip Use Casementioning
confidence: 99%
“…Other emerging VoIP IDSs [19], based on state machine analysis similar to previous works such as NetStat [22], may be used as a complementary IDS in our framework. Since this tool is not made available, we only consider that presented in [3]. One of the attack scenarios we consider is described in Figure 5.…”
Section: Voip Use Casementioning
confidence: 99%
See 1 more Smart Citation
“…These algorithms can successfully detect DoS and DDoS attacks on SIP proxies, but do not allow any prevention mechanisms. A final group of researchers are focussing on developing combined solutions to detect multiple types of attacks [26], [27], [28], however none of them are able to deliver DDoS mitigation mechanisms.…”
Section: Related Workmentioning
confidence: 99%