2016 15th International Conference on Ubiquitous Computing and Communications and 2016 International Symposium on Cyberspace An 2016
DOI: 10.1109/iucc-css.2016.016
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study of Denial of Service (DoS) against VoIP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 9 publications
1
7
0
Order By: Relevance
“…Hence, some cost is incurred only in the case where the student is either beyond the campus WIFI range or is communicating with a person not on the WIFI. The study therefore confirms earlier works on the economics of IP-PBX which makes Voice over IP (VOIP) a cost-effective alternative to the legacy PBX or key system [27].…”
Section: Discussionsupporting
confidence: 86%
“…Hence, some cost is incurred only in the case where the student is either beyond the campus WIFI range or is communicating with a person not on the WIFI. The study therefore confirms earlier works on the economics of IP-PBX which makes Voice over IP (VOIP) a cost-effective alternative to the legacy PBX or key system [27].…”
Section: Discussionsupporting
confidence: 86%
“…Yu have studied by capturing every incoming and outgoing SIP packet from the tcpdump data. In addition to the REGISTER flooding attack, we also identified the INVITE flooding attack [10]. Our major findings are (1) a REGISTER flooding rate of 200 msg/sec has the potential to deplete CPU resource and causes a Denial of Service (DoS) attack, and (2) an INVITE flooding rate with only 110 msg/sec could cause a DoS attack because of process stack overflow.…”
Section: Literature Reviewmentioning
confidence: 97%
“…A more comprehensive set of results is gathered by Yu [19] in a study of over 8 million intrusion attempts into a company VoIP network, operating using an IP-PBX. Additionally, included in the paper is an evaluation of three methods (disconnection of IP-PBX from the internet, firewall protection, and application protection) and their effectiveness when implemented in the IP-PBX.…”
Section: Measuring the Effectiveness Of Implementationmentioning
confidence: 99%