6th Joint IFIP Wireless and Mobile Networking Conference (WMNC) 2013
DOI: 10.1109/wmnc.2013.6549057
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight countermeasure to cope with flooding attacks against session initiation protocol

Abstract: Session Initiation Protocol (SIP) is a widely used protocol for voice and video communication in Internet architecture. Due to its open nature and the lack of robust security mechanisms, SIP is vulnerable to several attacks similar to those existing in Internet infrastructure, such as the flooding attack. An attacker can use any SIP request to launch a flooding attack, leading to severe consequences at either client or server side SIP elements or both of them. In this context, end user's devices are considered… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…In Hussain, a lightweight scheme has been proposed to counter both the single source and multi‐source flooding attacks. The user computes a specified threshold at the time of registration process and monitors the number of calls to a particular callee.…”
Section: Related Workmentioning
confidence: 99%
“…In Hussain, a lightweight scheme has been proposed to counter both the single source and multi‐source flooding attacks. The user computes a specified threshold at the time of registration process and monitors the number of calls to a particular callee.…”
Section: Related Workmentioning
confidence: 99%
“…In Figure , we plot the response time to the different rates of INVITE requests sent by an attacker. In our previous work , different flooding rates were applied to INVITE and REGISTER methods. We have measured the response time to illustrate the delay induced by the increasing memory consumption of SIP devices during the attack.…”
Section: The Consequences Of Flooding Attacksmentioning
confidence: 99%
“…Hussain et al , introduce a lightweight scheme to counter single source flooding and DDoS attacks targeting SIP servers. The user‐specified threshold, provided at the time of registration process, handles the number of calls to a particular SIP callee.…”
Section: Taxonomy Of the Existing Solutionsmentioning
confidence: 99%
“…• SIP flooding: SIP is vulnerable to a wide range of flooding attacks due to its open nature and the lack of robust security mechanisms (Hussain et al, 2013;Tang et al, 2012). On the application-layer, signalling floods are the most prominent.…”
Section: Sip-based Attacksmentioning
confidence: 99%