Some Application Layer Protocols in IP Networks

2020 ◽  
pp. 349-363
Author(s):  
Drago Hercog
Author(s):  
A. Abou El Kalam ◽  
M. Maachaoui ◽  
N. Idboufker ◽  
H. Ait Lahcen ◽  
A.Ait Ouahman

The IP multimedia subsystem (IMS) is a basis for a significant new architecture which offers network operators the opportunity to expand their services, by integrating voice and multimedia communications and delivering them into new environments with new purposes. Basically, the IMS is an overlay network on top of IP layer that uses Session Initiation Protocol (SIP) as the primary signaling mechanism. SIP works at the application layer in IP networks. It is thus faced to not only the IP-networks security issues, but also to new issues which are related to the SIP protocol directly. Consequently, using IMS bears several new security challenges. This paper presents the most relevant SIP-related security vulnerabilities and threats, and the implementation and simulation test bed to experiment two versions of the SIP Asterisk software to emphasize these threats. The different security mechanisms that can be deployed to overcome the SIP security issues while putting emphasis the most important ones are discussed. Afterwards, the authors propose adaptable solutions to the SIP threats already identified for a specific service (access information from anywhere) in IMS context. Finally, conclusions are drawn and some perspectives are introduced to improve the security of multimedia applications.


10.5772/9471 ◽  
2010 ◽  
Author(s):  
Thienne Johnson ◽  
Eleri Cardozo ◽  
Rodrigo Prado ◽  
Eduardo Zagari ◽  
Tomas B

Author(s):  
Antonio Nucci ◽  
Konstantina Papagiannaki
Keyword(s):  

2017 ◽  
Vol E100.B (3) ◽  
pp. 417-425 ◽  
Author(s):  
Stephane KAPTCHOUANG ◽  
Hiroki TAHARA ◽  
Eiji OKI

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document