A Secured Load Mitigation and Distribution Scheme for Securing SIP Server

被引:11
作者
Ganesan, Vennila [1 ]
Manikandan, M. S. K. [1 ]
机构
[1] Thiagarajar Coll Engn Madurai, Dept Elect & Commun Engn, Madurai, Tamil Nadu, India
关键词
END OVERLOAD CONTROL; NETWORKS; PERFORMANCE; MECHANISM;
D O I
10.1155/2017/7821487
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Managing the performance of the Session Initiation Protocol (SIP) server under heavy load conditions is a critical task in a Voice over Internet Protocol (VoIP) network. In this paper, a two-tier model is proposed for the security, load mitigation, and distribution issues of the SIP server. In the first tier, the proposed handler segregates and drops the malicious traffic. The second tier provides a uniform load of distribution, using the least session termination time (LSTT) algorithm. Besides, the mean session termination time is minimized by reducing the waiting time of the SIP messages. Efficiency of the LSTT algorithm is evaluated through the experimental test bed by considering with and without a handler. The experimental results establish that the proposed two-tier model improves the throughput and the CPU utilization. It also reduces the response time and error rate while preserving the quality of multimedia session delivery. This two-tier model provides robust security, dynamic load distribution, appropriate server selection, and session synchronization.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 43 条
[1]  
Abdelazim A, 2010, INT ARCH PHOTOGRAMM, V38, P1
[2]  
Akbar A, 2015, 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), P1204, DOI 10.1109/ICGCIoT.2015.7380646
[3]  
[Anonymous], IEEE GLOB TEL C
[4]  
[Anonymous], 2008, 5246 RFC
[5]   Overload control in SIP networks using no explicit feedback: A window based approach [J].
Azhari, Seyed Vahid ;
Homayouni, Maryam ;
Nemati, Hani ;
Enayatizadeh, Javad ;
Akbari, Ahmad .
COMPUTER COMMUNICATIONS, 2012, 35 (12) :1472-1483
[6]  
Belkhouraf M., 2015, P 4 INT C CLOUD COMP
[7]  
Bender MA, 2002, SIAM PROC S, P762
[8]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[9]  
Camarillo G., 2011, REINVITE TARGET REFR
[10]   An efficient end-to-end security mechanism for IP multimedia subsystem [J].
Chen, Chi-Yuan ;
Wu, Tin-Yu ;
Huang, Yueh-Min ;
Chao, Han-Chieh .
COMPUTER COMMUNICATIONS, 2008, 31 (18) :4259-4268