مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

334
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

197
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

DETECTING DENIAL OF SERVICE MESSAGE FLOODING ATTACKS IN SIP BASED SERVICES

Pages

  75-84

Abstract

 Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infrastructures. New attacks are developed that target directly the underlying SIP protocol in these related SIP setups. To detect such kinds of attacks we combined anomaly-based and specification-based intrusion detection techniques. We took advantages of the SIP state machine concept (according to RFC 3261) in our proposed solution. We also built and configured a real test-bed for SIP based services to generate normal and assumed attack traffics. We validated and evaluated our intrusion detection system with the dump traffic of this real test-bed and we also used another specific available dataset to have a more comprehensive evaluation. The experimental results show that our approach is effective in classifying normal and anomaly traffic in different situations. The Receiver Operating Characteristic (ROC) analysis is applied on final extracted results to select the working point of our system (set related thresholds).

Multimedia

  • No record.
  • Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ASGHARIAN, ZOHA, ASGHARIAN, HASSAN, AKBARI, AHMAD, & RAAHEMI, BIJAN. (2012). DETECTING DENIAL OF SERVICE MESSAGE FLOODING ATTACKS IN SIP BASED SERVICES. AMIRKABIR INTERNATIONAL JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 44(1), 75-84. SID. https://sid.ir/paper/334284/en

    Vancouver: Copy

    ASGHARIAN ZOHA, ASGHARIAN HASSAN, AKBARI AHMAD, RAAHEMI BIJAN. DETECTING DENIAL OF SERVICE MESSAGE FLOODING ATTACKS IN SIP BASED SERVICES. AMIRKABIR INTERNATIONAL JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING[Internet]. 2012;44(1):75-84. Available from: https://sid.ir/paper/334284/en

    IEEE: Copy

    ZOHA ASGHARIAN, HASSAN ASGHARIAN, AHMAD AKBARI, and BIJAN RAAHEMI, “DETECTING DENIAL OF SERVICE MESSAGE FLOODING ATTACKS IN SIP BASED SERVICES,” AMIRKABIR INTERNATIONAL JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, vol. 44, no. 1, pp. 75–84, 2012, [Online]. Available: https://sid.ir/paper/334284/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button