2020
DOI: 10.3390/electronics9111827
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks

Abstract: Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approache… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…Paper [4] presented a detailed survey on detection procedures for DoS and DDoS attacks in the context of VoIP network. DoS attack by flooding the SIP server with different SIP-messages, analysing the performance by SIP server by considering different performance metrics such as CPU and memory utilization is highlighted in [5].…”
Section: Related Workmentioning
confidence: 99%
“…Paper [4] presented a detailed survey on detection procedures for DoS and DDoS attacks in the context of VoIP network. DoS attack by flooding the SIP server with different SIP-messages, analysing the performance by SIP server by considering different performance metrics such as CPU and memory utilization is highlighted in [5].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed approach outperformed SVM in the dual form in terms of detection time and training time. Using deep learning approaches are rarely used to detect DoS and DDoS attacks [4]. Nazih et al [9] proposed a DDoS detection approach based on RNN.…”
Section: Related Workmentioning
confidence: 99%
“…Denial of Service (DoS) is an attack preventing legitimate users from using VoIP services. Malformed messages and flooding are the most frequent DoS attacks [4]. In the case of malformed messages attacks, the attacker sends a tampered SIP message to cause a partial failure or a restart of the SIP device when trying to process this message.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Botnets, which are made up of zombie devices taken over by internet hackers, are used by attackers. DDoS attacks are difficult to identify and block because they involve a large number of devices [8], [9]. As a result, one of the most pressing issues for administrators and network service providers is the rapid identification and mitigation of DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%