A practical method for SIP-DoS attack effect evaluation

被引:0
|
作者
Wang, Yulong [1 ]
Yang, Yi [1 ]
机构
[1] State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
来源
关键词
Network security - Decision making;
D O I
暂无
中图分类号
学科分类号
摘要
DDoS attacks with the malformed SIP messages (SIP-DoS) are a major threat to the security of SIP-based system. Evaluating the attack effect can help develop a more effective counter-attack mechanism. This paper presents an ANP-based method named SEM (SIP-DoS Evaluation Method). SEM adopts the entropy-weight method and the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to determine the importance of the attack effect metrics with respect to both the attack itself and the system under attack. SEM also contains an influence model for eliminating the impact the previous attacks have on the current attack. The experiment shows that SEM is more practical in that it can generate a more objective and precise evaluation compared with the previous state-of-the-art approaches. Copyright © 2012 Binary Information Press.
引用
收藏
页码:333 / 345
相关论文
共 50 条
  • [41] IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Fadhlillah, Aghnia
    Karna, Nyoman
    Irawan, Arif
    2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 18 - 22
  • [42] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [43] A Low-rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation
    Tang, Dan
    Wu, Xiaoxue
    Tang, Liu
    Man, Jianping
    Zhan, Sijia
    Liu, Qin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1358 - 1363
  • [44] How to Model the Bribery Attack: A Practical Quantification Method in Blockchain
    Sun, Hanyi
    Ruan, Na
    Su, Chunhua
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 569 - 589
  • [45] The detection method of low-rate DoS attack based on multi-feature fusion
    Liu, Liang
    Wang, Huaiyuan
    Wu, Zhijun
    Yue, Meng
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (04) : 504 - 513
  • [46] Low-rate DoS attack detection method based on hybrid deep neural networks
    Xu, Congyuan
    Shen, Jizhong
    Du, Xin
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [47] The detection method of low-rate DoS attack based on multi-feature fusion
    Liang Liu
    Huaiyuan Wang
    Zhijun Wu
    Meng Yue
    Digital Communications and Networks, 2020, 6 (04) : 504 - 513
  • [48] A PRACTICAL APPROACH TO INSTRUCTION IN METHOD EVALUATION
    LUEBBERT, P
    BENINATO, B
    LANGDON, S
    AMERICAN JOURNAL OF MEDICAL TECHNOLOGY, 1980, 46 (05): : 344 - 344
  • [49] SIMPLE PRACTICAL METHOD FOR EVALUATION OF MICRODIFFRACTION
    DELOYE, FX
    CADOR, C
    JOURNAL DE MICROSCOPIE, 1972, 15 (01): : 99 - +
  • [50] A PRACTICAL METHOD FOR THE EVALUATION OF WEAK GELS
    MUMALLAH, NA
    JOURNAL OF PETROLEUM TECHNOLOGY, 1987, 39 (02): : 195 - 202