A Bayesian change point model for detecting SIP-based DDoS attacks

被引:24
|
作者
Kurt, Baris [1 ]
Yildiz, Cagatay [1 ]
Ceritli, Taha Yusuf [1 ]
Sankur, Bulent [2 ]
Cemgil, Ali Taylan [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
[2] Bogazici Univ, Dept Elect & Elect Engn, TR-34342 Istanbul, Turkey
关键词
VoIP security; SIP; DDoS; Simulation; Bayesian change point models;
D O I
10.1016/j.dsp.2017.10.009
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Session Initiation Protocol (SIP), as one the most common signaling mechanism for Voice Over Internet Protocol (VoIP) applications, is a popular target for the flooding-based Distributed Denial of Service (DDoS) attacks. In this paper, we propose a DDoS attack detection framework based on the Bayesian multiple change model, which can detect different types of flooding attacks. Additionally, we propose a probabilistic SIP network simulation system that provides a test environment for network security tools. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 62
页数:15
相关论文
共 50 条
  • [31] An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment
    Varma, S. Asha
    Reddy, K. Ganesh
    [J]. INFORMATION SECURITY JOURNAL, 2023, 33 (06): : 613 - 625
  • [32] Detecting TCP-based DDoS attacks by linear regression analysis
    Chen, EY
    [J]. 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 381 - 386
  • [33] An SDN-based Decision Tree Detection (DTD) Model for Detecting DDoS Attacks in Cloud Environment
    Praba, J. Jeba
    Sridaran, R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (07) : 54 - 64
  • [34] A SIP-based architecture model for contextual coalition access control for ubiquitous computing
    Liscano, R
    Wang, KN
    [J]. PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 384 - 392
  • [35] Detecting and tracing DDoS attacks in the traffic analysis using auto regressive model
    Uchiyama, Y
    Waizumi, Y
    Kato, N
    Nemoto, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (12): : 2635 - 2643
  • [36] A Neural Network Model for Detecting DDoS Attacks Using Darknet Traffic Features
    Ali, Siti Hajar Aminah
    Ozawa, Seiichi
    Ban, Tao
    Nakazato, Junji
    Shimamura, Jumpei
    [J]. 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 2979 - 2985
  • [37] Detecting the DDoS attacks based on SYN proxy and hop-count filter
    Zhang, Fengli
    Geng, Ji
    Qin, Zhiguang
    Zhou, Mingtian
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 457 - +
  • [38] Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks
    Lin, Po-Ching
    Hsu, Yu-Ting
    Hwang, Ren-Hung
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 50 - 61
  • [39] Study on detecting DDOS attacks based on information entropy of multidimensional judgment matrix
    Wang, Xian
    Xie, Xiaoyao
    [J]. SOFT COMPUTING, 2023,
  • [40] Improved K-means-based solution for detecting DDoS attacks in SDN
    Qian, Haizhong
    Cai, Lili
    [J]. PHYSICAL COMMUNICATION, 2024, 64