DDoS attacks in VoIP: a brief review of detection and mitigation techniques
Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched tel...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Institute of Advanced Science Extension (IASE)
2016
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf https://eprints.ums.edu.my/id/eprint/19184/ https://doi.org/10.21833/ijaas.2016.09.013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ums.eprints.19184 |
---|---|
record_format |
eprints |
spelling |
my.ums.eprints.191842020-12-29T07:13:20Z https://eprints.ums.edu.my/id/eprint/19184/ DDoS attacks in VoIP: a brief review of detection and mitigation techniques Sambath Narayanan Selvakumar Manickam Leau, Yu Beng TK Electrical engineering. Electronics Nuclear engineering Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched telephone network and raise in phone portability migrated PSTN to VoIP. The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages. The VoIP became targeted victim of different attacks as internet became the medium of transmission. The security vulnerabilities arise from new protocols and the existing infrastructure of traditional data network. Flood-based attacks are more threatening and annoying than other attacks. This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine and RQA are presented. Institute of Advanced Science Extension (IASE) 2016-09 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf text en https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf Sambath Narayanan and Selvakumar Manickam and Leau, Yu Beng (2016) DDoS attacks in VoIP: a brief review of detection and mitigation techniques. International Journal of Advanced and Applied Sciences, 3 (9). pp. 90-96. ISSN 2313-3724 https://doi.org/10.21833/ijaas.2016.09.013 |
institution |
Universiti Malaysia Sabah |
building |
UMS Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sabah |
content_source |
UMS Institutional Repository |
url_provider |
http://eprints.ums.edu.my/ |
language |
English English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Sambath Narayanan Selvakumar Manickam Leau, Yu Beng DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
description |
Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched telephone network and raise in phone portability migrated PSTN to VoIP. The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages. The VoIP became targeted victim of different attacks as internet became the medium of transmission. The security vulnerabilities arise from new protocols and the existing infrastructure of traditional data network. Flood-based attacks are more threatening and annoying than other attacks. This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine and RQA are presented. |
format |
Article |
author |
Sambath Narayanan Selvakumar Manickam Leau, Yu Beng |
author_facet |
Sambath Narayanan Selvakumar Manickam Leau, Yu Beng |
author_sort |
Sambath Narayanan |
title |
DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
title_short |
DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
title_full |
DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
title_fullStr |
DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
title_full_unstemmed |
DDoS attacks in VoIP: a brief review of detection and mitigation techniques |
title_sort |
ddos attacks in voip: a brief review of detection and mitigation techniques |
publisher |
Institute of Advanced Science Extension (IASE) |
publishDate |
2016 |
url |
https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf https://eprints.ums.edu.my/id/eprint/19184/ https://doi.org/10.21833/ijaas.2016.09.013 |
_version_ |
1760229546951442432 |
score |
13.209306 |