2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.30
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP

Abstract: Abstract-Network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volume is usually both complex (slow) and privacy-neglecting. Especially, when it comes to VoIP, the literature on how audit trails can be exploited to identify attacks remains scarce. This paper provides an entropy-driven, privacypreserving, and practical framework for detecting resource con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…This method uses defined transaction state machines in SIP standard and can only detect different DoS attacks during transactions. In previous studies, 33,34 the authors used log files and audit trails to detect improper use of VoIP network. The privacy and huge size of users' information encouraged the authors to apply hash functions for anonymity purposes.…”
Section: Related Workmentioning
confidence: 99%
“…This method uses defined transaction state machines in SIP standard and can only detect different DoS attacks during transactions. In previous studies, 33,34 the authors used log files and audit trails to detect improper use of VoIP network. The privacy and huge size of users' information encouraged the authors to apply hash functions for anonymity purposes.…”
Section: Related Workmentioning
confidence: 99%
“… showed examples of attacks detected over SIP‐based VoIP, while Tsiatsikas et al . proposed a design to trace DoS attacks in VoIP, but does not protect users' identities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Precisely, a first contribution of this PhD thesis builds over the idea proposed in [129], that is, the use of Entropy theory to detect abnormalities in raw application data. Specifically, through extensive experimentation, we extend, calibrate and throughly assess the effectiveness of the initial idea, thus offering a complete formalized framework that can be used to trace and detect application layer DDoS attacks in SIP networks.…”
Section: Discussionmentioning
confidence: 99%
“…A year later, Tsiatsikas et al [34] proposed an entropy-driven framework for battling against DoS attacks in SIP. In essence, the authors extended their previous work introduced in [129]. As the authors stated, their scheme operates both as a standalone application and a software module destined to SIP proxies.…”
Section: Statistical Schemesmentioning
confidence: 97%
See 1 more Smart Citation