A practical method for SIP-DoS attack effect evaluation

被引:0
|
作者
Wang, Yulong [1 ]
Yang, Yi [1 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
关键词
Network security - Decision making;
D O I
暂无
中图分类号
学科分类号
摘要
DDoS attacks with the malformed SIP messages (SIP-DoS) are a major threat to the security of SIP-based system. Evaluating the attack effect can help develop a more effective counter-attack mechanism. This paper presents an ANP-based method named SEM (SIP-DoS Evaluation Method). SEM adopts the entropy-weight method and the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to determine the importance of the attack effect metrics with respect to both the attack itself and the system under attack. SEM also contains an influence model for eliminating the impact the previous attacks have on the current attack. The experiment shows that SEM is more practical in that it can generate a more objective and precise evaluation compared with the previous state-of-the-art approaches. Copyright © 2012 Binary Information Press.
引用
收藏
页码:333 / 345
相关论文
共 50 条
  • [31] A Practical Method for Minimization of Attack Surfaces in Information Warfare
    Wilson, Charles
    Wilkerson, Bradley
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 325 - 329
  • [32] Practical Performance Evaluation of Peer-to-peer Internet Telephony using SIP
    Meyer, Benjamin
    Portmann, Marius
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 204 - 209
  • [33] Evaluation of detection method to mitigate DoS attacks in MANETs
    Alsumayt, Albandari
    Haggerty, John
    Lotfi, Ahmad
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [34] An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks
    Malekzadeh, Mina
    Ghani, Abdul Azim Abdul
    Desa, Jalil
    Subramaniam, Shamala
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (08): : 1 - 5
  • [35] Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT
    Cusack, Brian
    Tian, Zhuang
    Kyaw, Ar Kar
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 127 - 138
  • [36] Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack
    Chang, Chunjie
    Zhu, Changhua
    Wang, Honggang
    Pei, Changxing
    INTERNET OF THINGS-BK, 2012, 312 : 126 - 132
  • [37] PRACTICAL METHOD OF SUBJECTIVE EVALUATION
    TUCKER, WG
    PROCEEDINGS OF THE AMERICAN ASSOCIATION FOR CANCER RESEARCH, 1974, 15 (MAR): : 180 - 180
  • [38] The DoS Attack Risk Calculation Based on the Entropy Method and Critical System Resources Usage
    Snigurov, Arkadij
    Chakrian, Vadym
    2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 186 - 187
  • [39] Adversarial Attack against DoS Intrusion Detection: An Improved Boundary-Based Method
    Peng, Xiao
    Huang, Weiqing
    Shi, Zhixin
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 1288 - 1295
  • [40] Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack
    Liu, Ye
    Cheng, Yaya
    Gao, Lianli
    Liu, Xianglong
    Zhang, Qilong
    Song, Jingkuan
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15084 - 15093