Filters








537 Hits in 5.0 sec

Fast Detection of Denial-of-Service Attacks on IP Telephony

Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyfrpct5rf6xjio5dwvrxuttu" style="color: black;">IEEE International Workshop on Quality of Service, IWQoS</a> </i> &nbsp;
Recently Voice over IP (VoIP) is experiencing a phenomenal growth. Being a real-time service, VoIP is more susceptible to Denial-of-Service (DoS) attacks than regular Internet services.  ...  Our experimental results show that vFDS achieves fast and accurate detection of DoS attacks.  ...  TLAS is based on TCP protocol behavior of (SYN, ACK) pairs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwqos.2006.250469">doi:10.1109/iwqos.2006.250469</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iwqos/SengarWWJ06.html">dblp:conf/iwqos/SengarWWJ06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/toxvdhwkkfggnpvfzvgx2m3eka">fatcat:toxvdhwkkfggnpvfzvgx2m3eka</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060828193713/http://www-net.cs.yale.edu/iwqos06/proceedings/21_Sengar_Hemant_289-session-6-pn.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/69/c4695cbde6ca25e4da02a20e0101249bff431570.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwqos.2006.250469"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Telephony Denial of Service defense at data plane (TDoSD@DP)

Aldo Febro, Hannan Xiao, Joseph Spring
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cy5l7lbhpvcppakk5vhwjykq2u" style="color: black;">NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium</a> </i> &nbsp;
A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident, during which legitimate users are unable to use telephony services.  ...  To make TDoS defense more widely deployed and yet affordable, this paper presents TDoSD@DP where TDoS detection and mitigation is programmed at the data plane so that it can be enabled on every switch  ...  INTRODUCTION Telephony Denial of Service (TDoS) attack has the potential to disrupt telecommunication services denying legitimate users access to the service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/noms.2018.8406281">doi:10.1109/noms.2018.8406281</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/noms/FebroXS18.html">dblp:conf/noms/FebroXS18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7xsp2oitqjeinmi2wkjpsvp3fm">fatcat:7xsp2oitqjeinmi2wkjpsvp3fm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200508100039/https://uhra.herts.ac.uk/bitstream/handle/2299/20901/IEEEPDP18_xiao_aam.pdf;jsessionid=016893747C1EDB0E5087C32B3EE9B553?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/6f/856fd647ade32c4389bf8f433c5910fc116dcc81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/noms.2018.8406281"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Review of SIP based DoS attacks

Abdirisaq M. Jama, Othman O. Khalifa
<span title="2016-12-29">2016</span> <i title="Association of Technology and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lhvdmzuqxreinc3m4ancngr4qi" style="color: black;">International Journal of Computer Applications Technology and Research</a> </i> &nbsp;
Unfortunately, SIP-based application services can suffer from various security threats as Denial of Service (DoS). attacks on a SIP based VoIP infrastructure that can severely compromise its reliability  ...  After that, detection techniques of SIP flooding attack and various exploited resources due to attack were discussed and finally the paper reviews previous work done on SIP based DoS attacks.  ...  As it is built on standard IP networks, it is vulnerable to the wide range of network attacks associated with the Internet, such as Denial of Service (DoS).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0512.1007">doi:10.7753/ijcatr0512.1007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pirfjbai2zd2jpfkbapizykzam">fatcat:pirfjbai2zd2jpfkbapizykzam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604112622/http://ijcat.com/archives/volume5/issue12/ijcatr05121007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e0/5d/e05d5e6b8225d44891f257c89178c122aef9da62.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0512.1007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Detection of Intruders and Flooding In Voip Using IDS, Jacobson Fast And Hellinger Distance Algorithms

A Rahul
<span title="">2012</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
VoIP Flood Detection System (VFDS) is aimed to detect TCP Flooding attacks and SIP Flooding attacks on SIP devices using Jacobian Fast and Hellinger distance algorithms.  ...  VoIP services are becoming increasingly a big competition to existing telephony services (PSTN).  ...  Internet to Distributed Denial of Service (DDoS) attacks [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0223036">doi:10.9790/0661-0223036</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7zsr6jmnxzeppkkrdoge63ohqq">fatcat:7zsr6jmnxzeppkkrdoge63ohqq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602035908/http://www.iosrjournals.org/iosr-jce/papers/vol2-issue2/E0223036.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/08/8a085416620c091acc953cf1224318c5503c493a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0223036"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Research on security architecture for cloud based Voice-Over Internet Protocol by securing infrastructures using hadoop clusters to Prevent Adaptive Anomaly Attacks in Cloud computing

<span title="2019-08-30">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h673cvfolnhl3mnbjxkhtxdtg4" style="color: black;">International Journal of Engineering and Advanced Technology</a> </i> &nbsp;
This feature over cloud is facing many challenges in the terms of quality of services and security.  ...  In this paper, we have analysed about some of the essential security issues on cloud based VoIP for preventing the adaptive anomaly attacks and some other security issues of cloud computing by applying  ...  Also, its focuses on the MAC address based security, hence the DoS(Denial of Service) attacks and R2L (Remote to Local) attacks can be prevented easily.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.f9378.088619">doi:10.35940/ijeat.f9378.088619</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/c6oxxoxgq5gqdnh3zbop24mcie">fatcat:c6oxxoxgq5gqdnh3zbop24mcie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200207191949/https://www.ijeat.org/wp-content/uploads/papers/v8i6/F9378088619.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/64/96/6496181283cc84a19a9a2386c6cbb0715bdc1e4b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.f9378.088619"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Session Initiation Protocol Security: A Brief Review

P.
<span title="2012-10-01">2012</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wake4w3hqzd4ndiy2zowpciv64" style="color: black;">Journal of Computer Science</a> </i> &nbsp;
It is confirmed that, message attacks are the most dominant category of SIP attacks.  ...  Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats.  ...  Sureswaran Ramadass, Director of National Advanced IPv6 Centre, Universiti Sains Malaysia for his kind support.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2012.348.357">doi:10.3844/jcssp.2012.348.357</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eamzyd6u3jbjxjkwh35p2uzram">fatcat:eamzyd6u3jbjxjkwh35p2uzram</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809154859/http://thescipub.com/PDF/jcssp.2012.348.357.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/18/77/1877264a649df50340b8b36f110ece17cf9ba90d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/jcssp.2012.348.357"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Fast Detection of Distributed Denial of Service Attacks in VoIP Networks Using Convolutional Neural Networks

Waleed Nazih, Yasser Hifny, Wail S. Elkilani, Tamer Mostafa
<span title="2020-12-31">2020</span> <i title="Egypts Presidential Specialized Council for Education and Scientific Research"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wloedbdfcffl3cdn2dehdftvby" style="color: black;">International Journal of Intelligent Computing and Information Sciences</a> </i> &nbsp;
Nazih et al Keywords: deep learning, convolutional neural networks, voice over IP, session initiation protocol, network security, distributed denial of service attacks Fast Detection of Distributed Denial  ...  The Distributed Denial of Service (DDoS) attack is a dangerous attack that preventing legitimate users from using VoIP services and draining their resources.  ...  Figure 7 . 7 Detection times of the CNN model and other approaches on a GPU Fast Detection of Distributed Denial of Service Attacks in Voip Networks Using Convolutional Neural Networks127 Table 1 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21608/ijicis.2021.51555.1046">doi:10.21608/ijicis.2021.51555.1046</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dexh6czbk5c3xnmc2xqgyrnarq">fatcat:dexh6czbk5c3xnmc2xqgyrnarq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210220130830/https://ijicis.journals.ekb.eg/article_145903_b799822fbdffddf56178d1dbd887abac.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/31/cd313242ba356b50b3fc4d6894fc4db42e87f2a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21608/ijicis.2021.51555.1046"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Novel Protocol Design and Collaborative Forensics Mechanism for VoIP Services

Hsien-Ming Hsu, Feng-Yu Lin, Yeali Sunny Sun, Meng Chang Chen
<span title="2012-02-01">2012</span> <i title="Engineering and Technology Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x35svotye5crdo2d6qzxuyyq7m" style="color: black;">Journal of Communications</a> </i> &nbsp;
In addition, we discuss the defense of PKI working with CFM against various types of attacks and analyze the features of CFP.  ...  The simplicity and low cost of Voice over Internet Protocol (VoIP) services has made these services increasingly popular as the Internet has grown.  ...  However, the one downside to PKI services is that they require more resources to function, and thus are more susceptible to "denial of service" attacks. 2) Discussion the Features on Collaborative Forensics  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jcm.7.2.132-142">doi:10.4304/jcm.7.2.132-142</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w64db2ch5jbhdnoh3w54osaaua">fatcat:w64db2ch5jbhdnoh3w54osaaua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809060454/http://www.jocm.us/uploadfile/2013/0416/20130416030722842.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/86/39/86393169e0b40a5c24a56f7dd0a5fcfc90358b51.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jcm.7.2.132-142"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack

Abhishek Kumar, P. Santhi Tilagam
<span title="2011-07-31">2011</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Low rate Denial-of Service (DoS) attack recently emerged as the greatest threat to enterprise VoIP systems.  ...  Compared to the other detection system our technique achieves advantages of accuracy, fast, light weight, and flexibility to deal with DDoS attack detection.  ...  In this paper, we focus on behavior based fast detection of low rate DoS attack on SIP server using area under curve.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/3067-4192">doi:10.5120/3067-4192</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/veqhcrdtrzc3xnvjugntyvxnj4">fatcat:veqhcrdtrzc3xnvjugntyvxnj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160804083639/http://www.ijcaonline.org:80/volume26/number1/pxc3874192.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/12/5512d9f89d36f41735961c4f10c494460e0306ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/3067-4192"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud

Ashutosh Satapathy, L. M. Jenila Livingston
<span title="2016-02-04">2016</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
Network Related Issues Attacks related to destroy, block, expose, alter, disable, steal or gain unauthorized access to information in VoIP network (e.g. threats include social, denial of service, service  ...  abuse, physical access, interruption of service etc.) are listed in Table 1 followed by different types of attacks 7,8 .  ...  Attacker can perform this attack continuously for certain period of time by spoofing more than one IP addresses which causes denial of service attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i6/81980">doi:10.17485/ijst/2016/v9i6/81980</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xmonjr6jfjey3d4mgkzwfv5w6y">fatcat:xmonjr6jfjey3d4mgkzwfv5w6y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719130337/http://www.indjst.org/index.php/indjst/article/download/81980/67568" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i6/81980"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Technical Issues for IP-Based Telephony in Nigeria

A. A. Ojugo.
<span title="">2013</span> <i title="Science Publishing Group"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ty74f7svere3dcrfxvit7ajqnq" style="color: black;">International Journal of Wireless Communications and Mobile Computing</a> </i> &nbsp;
Denial of Services attack prevents a legitimate user access to the network feats and services. Though rare and extremely difficult in PSTN; But, are common in IP networks.  ...  Applications of IP Telephony [21] Note IP-telephony as applied in various forms: 1.  ...  Security -end-to-end IP implies vulnerability to a variety of attacks as mentioned. This can be addressed using cryptographic schemes. 3.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.wcmc.20130102.11">doi:10.11648/j.wcmc.20130102.11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wiev7wzlhvcqxkv5ekh3x4lkgy">fatcat:wiev7wzlhvcqxkv5ekh3x4lkgy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706131402/http://article.sciencepublishinggroup.com/pdf/10.11648.j.wcmc.20130102.11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/4c/7f4ca6aa5758688b67bd3bacea795ee14d5d8854.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.wcmc.20130102.11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

DDoS attacks in VoIP: a brief review of detection and mitigation techniques

Sambath Narayanan, Selvakumar Manickam, Yu-Beng Leau
<span title="2016-09-25">2016</span> <i title="International Journal of Advanced and Applied Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yppskh3jfbc37jyfabcggfgibi" style="color: black;">International Journal of Advanced and Applied Sciences</a> </i> &nbsp;
This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine  ...  The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings.  ...  Denial of service (DoS) attack DoS is a flooding attack which involves the SIP phones to generate excessive SIP messages to a specific user agent within a short period of time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21833/ijaas.2016.09.013">doi:10.21833/ijaas.2016.09.013</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gzagduren5egzmn2enfazngsla">fatcat:gzagduren5egzmn2enfazngsla</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200216022743/http://science-gate.com/IJAAS/Articles/2016-3-9/13%202016-3-9-pp.90-96.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/c1/a7c1d8a8bc83539fdfc4fea2ed63a32384b3599f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21833/ijaas.2016.09.013"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms

D. Sisalem, J. Kuthan, S. Ehlert
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dj5kgyxcuzdmhaxvx5dcvfmvce" style="color: black;">IEEE Network</a> </i> &nbsp;
S S Abstract In this article we address the issue of denial of service attacks targeting the hardware and software of voice over IP servers or by misusing specific signaling protocol features.  ...  Therefore, this article is dedicated to investigating possibilities of launching denial of service attacks on SIP servers and ways for preventing and reducing the effects of such attacks.  ...  Overview of Denial of Service Attack Scenarios While in general DoS attacks are assumed to be mounted on purpose, one should also be aware of the so-called unwanted DoS attack potential.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2006.1705880">doi:10.1109/mnet.2006.1705880</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/v4yxywscu5b4pei56aalgkoiny">fatcat:v4yxywscu5b4pei56aalgkoiny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100624142226/http://www.cs.siue.edu/~wwhite/Caballero/Sisalem_IEEENetwork2006.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/3e/8f3e7a14862ac375d95ae621f34dfc3fe4df0a2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2006.1705880"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Smart Aggregation for VOIP Networks with Anomaly Awareness for Latency Minimization

Lovepreet Kaur, Rajdeep Kaur
<span title="2016-11-14">2016</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
This paper mainly focuses on aggregation of voice data over IP network.  ...  The proposed model has been designed for the purpose of VoIP data aggregation, which can hold the multiple streams altogether under the one aggregated stream inflowing between the two primary network switches  ...  VOIP is also called as broadband telephony, internet telephony, IP telephony and broadband phone service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i42/95617">doi:10.17485/ijst/2016/v9i42/95617</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o2wrjzisxzdchccmzrt665eiha">fatcat:o2wrjzisxzdchccmzrt665eiha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720013122/http://www.indjst.org/index.php/indjst/article/download/95617/74848" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2016/v9i42/95617"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

VoIP defender

Jens Fiedler, Tomas Kupka, Sven Ehlert, Thomas Magedanz, Dorgham Sisalem
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7c2zuoi5f5cipcas2mor36ma5i" style="color: black;">Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications - IPTComm &#39;07</a> </i> &nbsp;
VoIP services are becoming increasingly a big competition to existing telephony services (POTS / ISDN).  ...  The increasing number of customers using VoIP makes VoIP services a valuable target for attackers that want to bring down the service, take it over or simply abuse it to distribute their own content, like  ...  Schlegel et al propose a Spam over internet telephony (SPIT) prevention framework [12] , which focuses only on specific types off attacks to VoIP services (SPIT).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1326304.1326307">doi:10.1145/1326304.1326307</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iptcomm/FiedlerKEMS07.html">dblp:conf/iptcomm/FiedlerKEMS07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lnvljzhqsfbmxpx7criz4t3abu">fatcat:lnvljzhqsfbmxpx7criz4t3abu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812085715/http://startrinity.com/VoIP/Resources/sip374.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/28/0928dd48bb651355ca0001085e412bc5eb61ed2f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1326304.1326307"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 537 results