A practical method for SIP-DoS attack effect evaluation

被引:0
|
作者
Wang, Yulong [1 ]
Yang, Yi [1 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
关键词
Network security - Decision making;
D O I
暂无
中图分类号
学科分类号
摘要
DDoS attacks with the malformed SIP messages (SIP-DoS) are a major threat to the security of SIP-based system. Evaluating the attack effect can help develop a more effective counter-attack mechanism. This paper presents an ANP-based method named SEM (SIP-DoS Evaluation Method). SEM adopts the entropy-weight method and the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to determine the importance of the attack effect metrics with respect to both the attack itself and the system under attack. SEM also contains an influence model for eliminating the impact the previous attacks have on the current attack. The experiment shows that SEM is more practical in that it can generate a more objective and precise evaluation compared with the previous state-of-the-art approaches. Copyright © 2012 Binary Information Press.
引用
收藏
页码:333 / 345
相关论文
共 50 条
  • [21] A DoS attack detection method based on adversarial neural network
    Li, Yang
    Wu, Haiyan
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [22] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks
    Armoogum, Sheeba
    Mohamudally, Nawaz
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [23] The Effect Evaluation of the Network Attack Based on the Fuzzy Comprehensive Evaluation Method
    Shi, Zivan
    Zhao, Guolin
    Liu, Jianhao
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 367 - 371
  • [24] Evaluation of a low-rate DoS attack against iterative servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesus E.
    Garcia-Teodoro, Pedro
    COMPUTER NETWORKS, 2007, 51 (04) : 1013 - 1030
  • [25] Slowcomm: Design, development and performance evaluation of a new slow DoS attack
    Cambiaso, Enrico
    Papaleo, Gianluca
    Aiello, Maurizio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 23 - 31
  • [26] Evaluation of a low-rate DoS attack against application servers
    Macia-Fernandez, Gabriel
    Diaz-Verdejo, Jesue E.
    Garcia-Teodoro, Pedro
    COMPUTERS & SECURITY, 2008, 27 (7-8) : 335 - 354
  • [27] Application of Fuzzy AHP Method in the Effect Evaluation of Network Attack
    Sun, Zhicheng
    Liu, Mingyuan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC & MECHANICAL ENGINEERING AND INFORMATION TECHNOLOGY (EMEIT-2012), 2012, 23
  • [28] Detect DoS attack using MrDR method in merging two MANETs
    Alsumayt, Albandari
    Haggerty, John
    Lotfi, Ahmad
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 889 - 895
  • [29] The Traceback Method about DoS Attack in Open Grid Computing Environment
    Lee, Seoung-Hyeon
    Chae, Cheol-Joo
    Lee, Deok-Gyu
    Han, Jong-Wook
    Lee, Jae-Kwang
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 389 - +
  • [30] Practical evaluation of security against generalized interpolation attack
    Aoki, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01): : 33 - 38