Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks

被引:13
作者
Nazih, Waleed [1 ,2 ]
Elkilani, Wail S. [2 ,3 ]
Dhahri, Habib [3 ,4 ]
Abdelkader, Tamer [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
[3] King Saud Univ, Coll Appl Comp Sci CACS, Riyadh 11543, Saudi Arabia
[4] Univ Kairouan, Fac Sci & Technol, Sidi Bouzid 4352, Tunisia
关键词
voice over IP; session initiation protocol; network security; denial of service; distributed denial of service attacks; FLOODING ATTACKS; SERVICE ATTACK; SECURITY; BEHAVIOR; SYSTEM;
D O I
10.3390/electronics9111827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approaches to detect DoS and DDoS attacks, and classify them based on various factors. We then analyze these approaches according to various characteristics; furthermore, we investigate the main strengths and weaknesses of these approaches. Finally, we provide some remarks for enhancing the surveyed approaches and highlight directions for future research to build effective detection solutions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
[21]   Adaptive artificial immune networks for mitigating DoS flooding attacks [J].
Maestre Vidal, Jorge ;
Sandoval Orozco, Ana Lucila ;
Garcia Villalba, Luis Javier .
SWARM AND EVOLUTIONARY COMPUTATION, 2018, 38 :94-108
[22]   A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment [J].
Geneiatakis, Dimitris ;
Lambrinoudakis, Costas .
TELECOMMUNICATION SYSTEMS, 2007, 36 (04) :153-159
[23]   Implementing a secure VoIP communication over SIP-based networks [J].
Wen-Bin Hsieh ;
Jenq-Shiou Leu .
Wireless Networks, 2018, 24 :2915-2926
[24]   Anomaly-based DoS detection and prevention in SIP networks by modeling SIP normal traffic [J].
Hosseinpour, Mahsa ;
Yaghmaee, Mohammad Hossein ;
Seno, Seyed Amin Hosseini ;
Roshkhari, Hossein Khosravi ;
Asadi, Mohsen .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (18)
[25]   Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks [J].
Coscia, Antonio ;
Dentamaro, Vincenzo ;
Galantucci, Stefano ;
Maci, Antonio ;
Pirlo, Giuseppe .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
[26]   IP packet size entropy-based scheme for detection of DoS/DDoS attacks [J].
Du, Ping ;
Abe, Shunji .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) :1274-1281
[27]   Analysis of area-congestion-based DDoS attacks in ad hoc networks [J].
Gu, Qijun ;
Liu, Peng ;
Chu, Chao-Hsien .
AD HOC NETWORKS, 2007, 5 (05) :613-625
[28]   DDoS attacks in Industrial IoT: A survey [J].
Chaudhary, Shubhankar ;
Mishra, Pramod Kumar .
COMPUTER NETWORKS, 2023, 236
[29]   An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks [J].
Zhang, Liping ;
Tang, Shanyu ;
Zhu, Shaohui .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :126-133
[30]   Countering crossfire DDoS attacks through moving target defense in SDN networks using OpenFlow traffic modification [J].
Hyder, Muhammad Faraz ;
Fatima, Tasbiha ;
Khan, Shariq Mahmood ;
Arshad, Saadia .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (12)