A scalable detection and prevention scheme for voice over internet protocol (VoIP) signaling attacks using handler with Bloom filter

被引:4
|
作者
Ganesan, Vennila [1 ]
Manikandan, M. S. K. [1 ]
机构
[1] Thiagarajar Coll Engn, Dept Elect & Commun Engn, Madurai, Tamil Nadu, India
关键词
SYN FLOODING ATTACKS; SIP; SECURITY; SERVICE; DEFENSE;
D O I
10.1002/nem.1995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a two-tier model has been developed that includes a Handler and a Bloom filter (HBF). In the first-tier, the handler detects both the flooding and fake signaling attacks. The Bloom filter, in the second-tier, prevents both the attacks before reaching the victim. In the existing systems, the packet level features are used which do not perform well for detection and prevention of both the attacks. In this work, flow level features are applied in both tiers. The proposed model is implemented on the innocent Session Initiation Protocol (SIP) server in the VoIP network. The two-tier model ensures the reliability and trustworthiness between the service provider and the customer. Besides, it also provides billing information along with the exact call duration to a customer who makes a call. The experimental results show that the HBF results in a reduced detection time of 9seconds with the reduced false positive (FP) of less than 1% and the false negative (FN) of 0.002% and also preserves the voice call quality during media conversation.
引用
收藏
页数:18
相关论文
共 15 条
  • [1] A Generic Technique for Voice over Internet Protocol (VoIP) Traffic Detection
    Idrees, Fauzia
    Khan, Uzma Aslam
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 52 - 59
  • [2] Small office PBX using voice over Internet Protocol (VOIP)
    Alam, Md. Zaidul
    Bose, Saugata
    Rahman, Md. Mhafazur
    Al-Mumin, Mohammad Abdullah
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1618 - +
  • [3] Telemedicine Using Free Voice over Internet Protocol (VoIP) Technology
    Miller, David J.
    Miljkovic, Nikola
    Chiesa, Chad
    Callahan, John B., Jr.
    Webb, Brad
    Boedeker, Ben H.
    [J]. MEDICINE MEETS VIRTUAL REALITY 18, 2011, 163 : 369 - 371
  • [4] Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM
    Vennila, G.
    Manikandan, M. S. K.
    Suresh, M. N.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [5] Evaluation of the Quality of Service of Voice Over Internet Protocol (VoIP) Using Active Queue Management (AQM)
    Alfonso Reguera, Vitalio
    Alvarez Paliza, Felix F.
    Arco Rios, Pedro
    Rodriguez Lopez, Carlos A.
    [J]. REVISTA CUBANA DE INGENIERIA, 2010, 1 (02): : 29 - 37
  • [6] Using the Hierarchical Decision Model (HDM) to Select a Sustainable Voice Over Internet Protocol (VOIP) Provider
    Alsoubaie, Fayez
    [J]. 2019 PORTLAND INTERNATIONAL CONFERENCE ON MANAGEMENT OF ENGINEERING AND TECHNOLOGY (PICMET), 2019,
  • [7] Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network
    Vennila, Ganesan
    Manikandan, M. S. K.
    Suresh, M. N.
    [J]. COMPUTERS & SECURITY, 2018, 73 : 1 - 16
  • [8] Detection of Human and Computer Voice Spammers Using Hidden Markov Model in Voice over Internet Protocol Network
    Vennila, G.
    Manikandan, M. S. K.
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 588 - 595
  • [9] A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
    Azeem Irshad
    Muhammad Sher
    Shehzad Ashraf Eid Rehman
    Mahmood Ul Ch
    Anwar Hassan
    [J]. Multimedia Tools and Applications, 2015, 74 : 3967 - 3984
  • [10] A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
    Irshad, Azeem
    Sher, Muhammad
    Rehman, Eid
    Ch, Shehzad Ashraf
    Ul Hassan, Mahmood
    Ghani, Anwar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (11) : 3967 - 3984