Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks

被引:13
作者
Nazih, Waleed [1 ,2 ]
Elkilani, Wail S. [2 ,3 ]
Dhahri, Habib [3 ,4 ]
Abdelkader, Tamer [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
[3] King Saud Univ, Coll Appl Comp Sci CACS, Riyadh 11543, Saudi Arabia
[4] Univ Kairouan, Fac Sci & Technol, Sidi Bouzid 4352, Tunisia
关键词
voice over IP; session initiation protocol; network security; denial of service; distributed denial of service attacks; FLOODING ATTACKS; SERVICE ATTACK; SECURITY; BEHAVIOR; SYSTEM;
D O I
10.3390/electronics9111827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approaches to detect DoS and DDoS attacks, and classify them based on various factors. We then analyze these approaches according to various characteristics; furthermore, we investigate the main strengths and weaknesses of these approaches. Finally, we provide some remarks for enhancing the surveyed approaches and highlight directions for future research to build effective detection solutions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
[31]   A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems [J].
Younes, Osama S. .
COMPUTER NETWORKS, 2024, 240
[32]   Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN: An Experimental Approach [J].
Galeano-Brajones, Jesus ;
Carmona-Murillo, Javier ;
Valenzuela-Valdes, Juan F. ;
Luna-Valero, Francisco .
SENSORS, 2020, 20 (03)
[33]   Countering Active Attacks on RAFT-Based IoT Blockchain Networks [J].
Buttar, Hasan Mujtaba ;
Aman, Waqas ;
Rahman, M. Mahboob Ur ;
Abbasi, Qammer H. .
IEEE SENSORS JOURNAL, 2023, 23 (13) :14691-14699
[34]   NADA: new architecture for detecting DoS and DDoS attacks in fog computing [J].
Azizpour, Saeed ;
Majma, MohammadReza .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) :51-64
[35]   Analysis of the Impact of the Slow HTTP DOS and DDOS Attacks on the Cloud Environment [J].
Yevsieieva, Oksana ;
Helalat, Seyed Milad .
2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, :519-523
[36]   Practical DoS Attacks on Embedded Networks in Commercial Vehicles [J].
Mukherjee, Subhojeet ;
Shirazi, Hossein ;
Ray, Indrakshi ;
Daily, Jeremy ;
Gamble, Rose .
INFORMATION SYSTEMS SECURITY, 2016, 10063 :23-42
[37]   Signaling-Oriented DoS Attacks in UMTS Networks [J].
Kambourakis, Georgios ;
Kolias, Constantinos ;
Gritzalis, Stefanos ;
Hyuk-Park, Jong .
ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 :280-+
[38]   A game theoretic defence framework against DoS/DDoS cyber attacks [J].
Spyridopoulos, T. ;
Karanikas, G. ;
Tryfonas, T. ;
Oikonomou, G. .
COMPUTERS & SECURITY, 2013, 38 :39-50
[39]   Uncovering SIP Vulnerabilities to DoS Attacks using Coloured Petri Nets [J].
Liu, Lin .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :29-36
[40]   COUNTERING BYZANTINE ATTACKS IN COGNITIVE RADIO NETWORKS [J].
Rawat, Ankit Singh ;
Anand, Priyank ;
Chen, Hao ;
Varshney, Pramod K. .
2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, :3098-3101