2017
DOI: 10.1109/tifs.2016.2632071
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…Therefore, the SIP component will be put out of service for legitimate users. This attack has multiple forms such as INVITE flooding, shown in Figure 4, REGISTER flooding, BYE flooding, and multi-attribute flooding [19].…”
Section: Flooding Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the SIP component will be put out of service for legitimate users. This attack has multiple forms such as INVITE flooding, shown in Figure 4, REGISTER flooding, BYE flooding, and multi-attribute flooding [19].…”
Section: Flooding Attacksmentioning
confidence: 99%
“…Then, if incoming SIP messages have significant deviation-usually by exceeding some threshold(s)-from normal behavior, an attack alarm is raised. Because these approaches are sometimes based on the differences in occurrence counts of different events, it may fail to detect certain attacks or produce false alarms [19]. These can automatically detect unknown attacks in the meantime.…”
Section: Statistically Based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, smart devices (i.e., sensors, controllers) and wireless networks make the data collection and distribution to computers easier, thus promoting extensive researches on data-based anomaly detection algorithms. Based on the type of data, anomaly detection algorithms can deal with time-series data [ 9 , 10 , 11 ], discrete data [ 12 , 13 , 14 , 15 ], or mixed types of data [ 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…There are other known threat vectors to VoIP systems like flooding and coordinated attacks, billing attacks, user enumeration, spoofing and man‐in‐the‐middle attacks …”
mentioning
confidence: 99%