2015
DOI: 10.1109/tnsm.2015.2459603
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Mimicry Attacks Against the Session Initiation Protocol

Abstract: The US National Academies of Science's Board on Science, Technology and Economic Policy estimates that the Internet and voice-over-IP (VoIP) communications infrastructure generates 10% of US economic growth. As market forces move increasingly towards Internet and VoIP communications, there is proportional increase in Telephony Denial of Service (TDoS) attacks. Like Denial of Service (DoS) attacks, TDoS attacks seek to disrupt business and commerce by directing a flood of anomalous traffic towards key communica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…Malicious messages are conceptually simulating benign messages. Using datasets with large differences between benign and malicious messages leads to unrealistic high performance [ 40 ]. To avoid this in our experiments, our attack simulation tool generates traffic that mimics the real traffic.…”
Section: Datasetmentioning
confidence: 99%
“…Malicious messages are conceptually simulating benign messages. Using datasets with large differences between benign and malicious messages leads to unrealistic high performance [ 40 ]. To avoid this in our experiments, our attack simulation tool generates traffic that mimics the real traffic.…”
Section: Datasetmentioning
confidence: 99%
“…Preventing mimicry telephony denial of service (TDoS) using multiple classifier systems (MCS) was proposed by Marchal et al [46]. Mimicry TDoS can be launched by a malformed message that is slightly changed from a normal message.…”
Section: Machine Learning Approachesmentioning
confidence: 99%
“…It is worth mentioning that almost all the work surveyed uses a simulated dataset, excluding [46,49] where real datasets are used. In [23], the authors tried to mimic a real dataset by using a simulated dataset with one server and nine clients in different regions connected via the internet.…”
Section: Analysis Of Surveyed Approachesmentioning
confidence: 99%
“…Flooding attack is considered as the result of the sending INVITE messages from one or several sources and also TCP-SYN like attacks in this study. In Marchal et al, 35 a particular telephony DoS attack named mimicry TDoS is studied. Also in Roh et al, 32 a detection method using Bloom data structure is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Also, an entropy-based method is used to compare the information and detect the attacks. In Marchal et al, 35 a particular telephony DoS attack named mimicry TDoS is studied. The authors elaborated malformed messages that have a slight difference with a syntactically correct one.…”
Section: Related Workmentioning
confidence: 99%