Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks

被引:13
作者
Nazih, Waleed [1 ,2 ]
Elkilani, Wail S. [2 ,3 ]
Dhahri, Habib [3 ,4 ]
Abdelkader, Tamer [2 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[2] Ain Shams Univ, Fac Comp & Informat Sci, Cairo 11566, Egypt
[3] King Saud Univ, Coll Appl Comp Sci CACS, Riyadh 11543, Saudi Arabia
[4] Univ Kairouan, Fac Sci & Technol, Sidi Bouzid 4352, Tunisia
关键词
voice over IP; session initiation protocol; network security; denial of service; distributed denial of service attacks; FLOODING ATTACKS; SERVICE ATTACK; SECURITY; BEHAVIOR; SYSTEM;
D O I
10.3390/electronics9111827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approaches to detect DoS and DDoS attacks, and classify them based on various factors. We then analyze these approaches according to various characteristics; furthermore, we investigate the main strengths and weaknesses of these approaches. Finally, we provide some remarks for enhancing the surveyed approaches and highlight directions for future research to build effective detection solutions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
[41]   Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony [J].
Akbar, Muhammad Ali ;
Farooq, Muddassar .
KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) :491-510
[42]   Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony [J].
Muhammad Ali Akbar ;
Muddassar Farooq .
Knowledge and Information Systems, 2014, 38 :491-510
[43]   Detect DDoS flooding attacks in mobile ad hoc networks [J].
Guo Y. ;
Perreau S. .
International Journal of Security and Networks, 2010, 5 (04) :259-269
[44]   A Framework for Mitigating DDoS and DOS Attacks in IoT Environment Using Hybrid Approach [J].
Ghali, Abdulrahman Aminu ;
Ahmad, Rohiza ;
Alhussian, Hitham .
ELECTRONICS, 2021, 10 (11)
[45]   Efficient Detection and Localization of DoS Attacks in Heterogeneous Vehicular Networks [J].
Dey, Meenu Rani ;
Patra, Moumita ;
Mishra, Prabhat .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) :5597-5611
[46]   A Scrutinized study on DoS attacks in Wireless Sensor Networks and need of SDN in Mitigating DoS attacks [J].
Sarkunavathi, A. ;
Srinivasan, V .
2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
[47]   Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks [J].
Iashvili, Giorgi ;
Iavich, Maksim ;
Bocu, Razvan ;
Odarchenko, Roman ;
Gnatyuk, Sergiy .
PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, :861-864
[48]   DDoS attacks and machine-learning-based detection methods: A survey and taxonomy [J].
Najafimehr, Mohammad ;
Zarifzadeh, Sajjad ;
Mostafavi, Seyedakbar .
ENGINEERING REPORTS, 2023, 5 (12)
[49]   Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey [J].
Shah, Zawar ;
Ullah, Imdad ;
Li, Huiling ;
Levula, Andrew ;
Khurshid, Khawar .
SENSORS, 2022, 22 (03)
[50]   Localization and Detection of Sinkhole Attacks in Wireless Sensor Networks Based on Denial of Service (DoS) Attacks [J].
Mona, R. ;
Manoranjitham, R. .
JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) :195-204