Effectiveness of SIP Server Under SIP Flooding Attack During VoIP Calls

2019 ◽  
Vol 108 (4) ◽  
pp. 2229-2239
Author(s):  
Santosh Kumar ◽  
Umesh Kumar Tiwari ◽  
Mandeep Kaur
Keyword(s):  
Author(s):  
Ting-Yu Lin ◽  
Jhen-Ping Wu ◽  
Pei-Hsuan Hung ◽  
Ching-Hsuan Shao ◽  
Yu-Ting Wang ◽  
...  

2018 ◽  
Vol 12 (1) ◽  
pp. 15-22 ◽  
Author(s):  
T. Bhatia ◽  
A.K. Verma ◽  
G. Sharma ◽  
S. Bala

Author(s):  
Guang Cheng ◽  
Lixia Zhao ◽  
Xiaoyan Hu ◽  
Shaoqi Zheng ◽  
Hua Wu ◽  
...  
Keyword(s):  

2009 ◽  
Vol 13 (10) ◽  
pp. 800-802 ◽  
Author(s):  
Chenfeng Zhou ◽  
Christopher Leckie ◽  
Kotagiri Ramamohanarao
Keyword(s):  

2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Vennila Ganesan ◽  
Manikandan MSK

Managing the performance of the Session Initiation Protocol (SIP) server under heavy load conditions is a critical task in a Voice over Internet Protocol (VoIP) network. In this paper, a two-tier model is proposed for the security, load mitigation, and distribution issues of the SIP server. In the first tier, the proposed handler segregates and drops the malicious traffic. The second tier provides a uniform load of distribution, using the least session termination time (LSTT) algorithm. Besides, the mean session termination time is minimized by reducing the waiting time of the SIP messages. Efficiency of the LSTT algorithm is evaluated through the experimental test bed by considering with and without a handler. The experimental results establish that the proposed two-tier model improves the throughput and the CPU utilization. It also reduces the response time and error rate while preserving the quality of multimedia session delivery. This two-tier model provides robust security, dynamic load distribution, appropriate server selection, and session synchronization.


Author(s):  
Linjun Yu ◽  
Huali Ai ◽  
Dong-Oun Choi

Named data networking (NDN) is a typical representation and implementation of information-centric networking and serves as a basis for the next-generation Internet. However, any network architectures will face information security threats. An attack named interest flooding attack (IFA), which is evolved, has becomes a great threat for NDN in recent years. Attackers through insert numerous forged interest packets into an NDN network, making the cache memory of NDN router(s) overrun, interest packets for the intended users. To take a comprehensive understanding of recent IFA detection and mitigation approaches, in this paper, we compared nine typical approaches to resolving IFA attacks for NDN, which are interest traceback, token bucket with per interface fairness, satisfaction-based interest acceptance, satisfaction-based push back, disabling PIT exhaustion, interest flow control method based on user reputation and content name prefixes, interest flow balancing method focused on the number of requests on named data networking, cryptographic route token, Poseidon local, and Poseidon distributed techniques. In addition, we conducted a simulation using Poseidon, a commonly used IFA resolution approach. The results showed that Poseidon could resolve IFA issues effectively.


Sign in / Sign up

Export Citation Format

Share Document