{"title":"基于sip的VOIP网络中DOS攻击检测技术的比较研究","authors":"Rababe Safoine, Soufyane Mounir, A. Farchi","doi":"10.1109/ICMCS.2018.8525878","DOIUrl":null,"url":null,"abstract":"Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP) networks, the use of VoIP services has significantly increased. Session Initiation Protocol (SIP) is the main protocol used for nowadays VoIP services. Being a text based protocol and implemented in an open environment, SIP is exposed to various security threats including flooding. One of the most well-known attacks is Denial of Service. Given this, numerous flooding detecting techniques were designed. Our paper will focus on presenting a study of those different techniques, and comparing two specific proposed mechanisms for detecting anomalies and alerting users of possible intrusions. Besides, we propose a new VoIP scheme of detecting attacks, so as to protect private communications and raise security awareness in SIP-based VoIP networks.","PeriodicalId":272255,"journal":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks\",\"authors\":\"Rababe Safoine, Soufyane Mounir, A. Farchi\",\"doi\":\"10.1109/ICMCS.2018.8525878\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP) networks, the use of VoIP services has significantly increased. Session Initiation Protocol (SIP) is the main protocol used for nowadays VoIP services. Being a text based protocol and implemented in an open environment, SIP is exposed to various security threats including flooding. One of the most well-known attacks is Denial of Service. Given this, numerous flooding detecting techniques were designed. Our paper will focus on presenting a study of those different techniques, and comparing two specific proposed mechanisms for detecting anomalies and alerting users of possible intrusions. Besides, we propose a new VoIP scheme of detecting attacks, so as to protect private communications and raise security awareness in SIP-based VoIP networks.\",\"PeriodicalId\":272255,\"journal\":{\"name\":\"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMCS.2018.8525878\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCS.2018.8525878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks
Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP) networks, the use of VoIP services has significantly increased. Session Initiation Protocol (SIP) is the main protocol used for nowadays VoIP services. Being a text based protocol and implemented in an open environment, SIP is exposed to various security threats including flooding. One of the most well-known attacks is Denial of Service. Given this, numerous flooding detecting techniques were designed. Our paper will focus on presenting a study of those different techniques, and comparing two specific proposed mechanisms for detecting anomalies and alerting users of possible intrusions. Besides, we propose a new VoIP scheme of detecting attacks, so as to protect private communications and raise security awareness in SIP-based VoIP networks.