DDoS attacks in VoIP: a brief review of detection and mitigation techniques

Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched tel...

Full description

Saved in:
Bibliographic Details
Main Authors: Sambath Narayanan, Selvakumar Manickam, Leau, Yu Beng
Format: Article
Language:English
English
Published: Institute of Advanced Science Extension (IASE) 2016
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf
https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf
https://eprints.ums.edu.my/id/eprint/19184/
https://doi.org/10.21833/ijaas.2016.09.013
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ums.eprints.19184
record_format eprints
spelling my.ums.eprints.191842020-12-29T07:13:20Z https://eprints.ums.edu.my/id/eprint/19184/ DDoS attacks in VoIP: a brief review of detection and mitigation techniques Sambath Narayanan Selvakumar Manickam Leau, Yu Beng TK Electrical engineering. Electronics Nuclear engineering Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched telephone network and raise in phone portability migrated PSTN to VoIP. The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages. The VoIP became targeted victim of different attacks as internet became the medium of transmission. The security vulnerabilities arise from new protocols and the existing infrastructure of traditional data network. Flood-based attacks are more threatening and annoying than other attacks. This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine and RQA are presented. Institute of Advanced Science Extension (IASE) 2016-09 Article PeerReviewed text en https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf text en https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf Sambath Narayanan and Selvakumar Manickam and Leau, Yu Beng (2016) DDoS attacks in VoIP: a brief review of detection and mitigation techniques. International Journal of Advanced and Applied Sciences, 3 (9). pp. 90-96. ISSN 2313-3724 https://doi.org/10.21833/ijaas.2016.09.013
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Sambath Narayanan
Selvakumar Manickam
Leau, Yu Beng
DDoS attacks in VoIP: a brief review of detection and mitigation techniques
description Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched telephone network and raise in phone portability migrated PSTN to VoIP. The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages. The VoIP became targeted victim of different attacks as internet became the medium of transmission. The security vulnerabilities arise from new protocols and the existing infrastructure of traditional data network. Flood-based attacks are more threatening and annoying than other attacks. This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine and RQA are presented.
format Article
author Sambath Narayanan
Selvakumar Manickam
Leau, Yu Beng
author_facet Sambath Narayanan
Selvakumar Manickam
Leau, Yu Beng
author_sort Sambath Narayanan
title DDoS attacks in VoIP: a brief review of detection and mitigation techniques
title_short DDoS attacks in VoIP: a brief review of detection and mitigation techniques
title_full DDoS attacks in VoIP: a brief review of detection and mitigation techniques
title_fullStr DDoS attacks in VoIP: a brief review of detection and mitigation techniques
title_full_unstemmed DDoS attacks in VoIP: a brief review of detection and mitigation techniques
title_sort ddos attacks in voip: a brief review of detection and mitigation techniques
publisher Institute of Advanced Science Extension (IASE)
publishDate 2016
url https://eprints.ums.edu.my/id/eprint/19184/1/DDoS%20attacks%20in%20VoIP.pdf
https://eprints.ums.edu.my/id/eprint/19184/7/DDoS%20attacks%20in%20VoIP%20a%20brief%20review%20of%20detection%20and%20mitigation%20techniques.pdf
https://eprints.ums.edu.my/id/eprint/19184/
https://doi.org/10.21833/ijaas.2016.09.013
_version_ 1760229546951442432
score 13.209306