2006
DOI: 10.1109/iwqos.2006.250469
|View full text |Cite
|
Sign up to set email alerts
|

Fast Detection of Denial-of-Service Attacks on IP Telephony

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2008
2008
2017
2017

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 9 publications
0
28
0
1
Order By: Relevance
“…The results can 6 Multi-source flooding attack detection rate and false detection rate be found in Table 1. In the experiment, we choose k p = 3 and m p = 500 to achieve a good balance of detection rate, filter rate and memory consumption.…”
Section: The Length Of Pfiltermentioning
confidence: 99%
See 1 more Smart Citation
“…The results can 6 Multi-source flooding attack detection rate and false detection rate be found in Table 1. In the experiment, we choose k p = 3 and m p = 500 to achieve a good balance of detection rate, filter rate and memory consumption.…”
Section: The Length Of Pfiltermentioning
confidence: 99%
“…Stealthy flooding attack is a kind of attack that is difficult to distinguish because the attacker patiently increases the flooding rate in slow pace. Sengar et al [6], [7] also propose the statistical detection mechanism called vFDS based on sudden surge caused by incomplete the handshaking processes in SIP. In their scheme, training phase is also needed to provide a baseline.…”
Section: Introductionmentioning
confidence: 99%
“…Sengar et al [98], [99] describe vFDS, an anomaly detection system that seeks to identify flooding denial of service attacks in VoIP. The approach taken is to measure abnormal variations in the relationships between related packet streams using the Hellinger distance, a measure of the deviation between two probability measures.…”
Section: D) Captchas and Puzzles (4 Items)mentioning
confidence: 99%
“…Reynolds and Ghosal [15] proposed a multi-protocol scheme to defend against flooding attacks on VoIP networks. Wu et al [25] and Sengar et al [18] presented using state information and cross-protocol correlation to detect denial-of-service attacks on VoIP. Sengar et al [19] detailed a VoIP intrusion detection based interactive protocol state machine.…”
Section: Related Workmentioning
confidence: 99%