2014
DOI: 10.2478/cait-2014-0002
|View full text |Cite
|
Sign up to set email alerts
|

Rqa based approach to detect and prevent ddos attacks in voip networks

Abstract: Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol (SIP) is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it. Distributed Denial of Service Attack (D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected tra c information. The approach reported in [51] analyzes DDoS and flash crowd characteristics and provides an e↵ective way to distinguish between the two in VoIP networks. The authors validate the method by simulation.…”
Section: Present a Methods Calledmentioning
confidence: 99%
“…The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected tra c information. The approach reported in [51] analyzes DDoS and flash crowd characteristics and provides an e↵ective way to distinguish between the two in VoIP networks. The authors validate the method by simulation.…”
Section: Present a Methods Calledmentioning
confidence: 99%
“…Some of them are Entropy (Tritilanunt et al, 2010), Wavelet (Li and Li, 2009), Sketch and Hellinger distance (Tang et al, 2012), Sunshine framework (Hoffstadt, et al, 2014) and Recurrence Quantification based Approach (Jeyanthi et al, 2014). The above methods are contending in detail in the succeeding section.…”
Section: Ddos Detection and Mitigation Techniques In Voipmentioning
confidence: 99%
“…Jeyanthi et al [16] developed entropy based mechanism to detect and discriminate DDoS attacks from flash events approach. The entropy based approach is well suited for differentiating legal users and attackers.…”
Section: Mechanisms To Address Ddos Attacksmentioning
confidence: 99%