{"title":"SIP Flood Attack Detection Method Based on Convolution Neural","authors":"Guo Shuai, Lu Ran, Yi Jing, Wenfeng Liu","doi":"10.1109/icomssc45026.2018.8941935","DOIUrl":null,"url":null,"abstract":"Aiming at a large number of useless signaling messages generated by Session Initiation Protocol (SIP) in IP networks, the problem of SIP flooding attacks caused by normal call requests cannot be established by users, and a SIP flooding attack detection method based on convolutional neural network is proposed. This method uses a window to perform convolution calculation on the input data, and judges whether there is a SIP message flood attack in the network based on the result of the calculation. Experimental results show that the proposed method can effectively detect SIP flooding attacks in IMS networks.","PeriodicalId":332213,"journal":{"name":"2018 International Computers, Signals and Systems Conference (ICOMSSC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Computers, Signals and Systems Conference (ICOMSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icomssc45026.2018.8941935","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Aiming at a large number of useless signaling messages generated by Session Initiation Protocol (SIP) in IP networks, the problem of SIP flooding attacks caused by normal call requests cannot be established by users, and a SIP flooding attack detection method based on convolutional neural network is proposed. This method uses a window to perform convolution calculation on the input data, and judges whether there is a SIP message flood attack in the network based on the result of the calculation. Experimental results show that the proposed method can effectively detect SIP flooding attacks in IMS networks.