2014 Applications and Innovations in Mobile Computing (AIMoC) 2014
DOI: 10.1109/aimoc.2014.6785540
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of VoIP spoofing attacks using classification algorithms

Abstract: Voice over Internet Protocol (VoIP) is an emerging trend of applications on the internet today. As with any recent technology, VoIP also introduces both fortuity and problems. Existing VoIP honeypot experimental set ups based on SIP (Session Initiation Protocol) deals with the basic attacks like DoS (Denial of Service), enumeration detection, signature collection and SPIT (Spam over Internet Telephony). These VoIP service abuse attacks cause discrepancy between the services offered to the VoIP users and servic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…P1 -Toyoda et al [34], P2 -Chikha et al [24], P3 -Su M.-Y. et al [25], P4 -Azad et al [26], P5 -Liu et al [13], P6 -Batthalla et al [36], P7 -Vennila et al [37], P8 -Barghi et al [19] 1) Hyper-Parameter Optimization…”
Section: Application Of Neural Network Algorithms To Spitmentioning
confidence: 99%
“…P1 -Toyoda et al [34], P2 -Chikha et al [24], P3 -Su M.-Y. et al [25], P4 -Azad et al [26], P5 -Liu et al [13], P6 -Batthalla et al [36], P7 -Vennila et al [37], P8 -Barghi et al [19] 1) Hyper-Parameter Optimization…”
Section: Application Of Neural Network Algorithms To Spitmentioning
confidence: 99%
“…The problem of Caller ID spoofing has taken the center stage in recent years due to huge losses that people has faced in the form of financial value, breach of privacy, and reputation. In [6] the authors debate on the steting up a honey pot for Smap over Internet Telephony (SPIT) and propose an algorithm to mitigate the denial of service attacks. However, we believe that deployment of a honey pot for voice traffic is a big net that is casted over all the voice traffic of a service provider which may effect the quality of service of legitimate users too.…”
Section: Related Workmentioning
confidence: 99%
“…This study proposes a test-base using Zoiper (SIP clients) and Asterisk server Private Branch Exchange (PBX) for an intranet VOIP application. The Zoiper and Asterisk intranet VOIP implementation allows free communication without the need for telecommunication provider charges be it call or data rates [11]. Zoiper (SIP client) is based on a custom configured PBX using the Asterisk server to facilitate student communications across a multiple university campus setting in developing countries.…”
Section: Introductionmentioning
confidence: 99%