Application layer denial-of-service attacks and defense mechanisms: a survey
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
SkyShield: A sketch-based defense system against application layer DDoS attacks
Application layer distributed denial of service (DDoS) attacks have become a severe threat
to the security of web servers. These attacks evade most intrusion prevention systems by …
to the security of web servers. These attacks evade most intrusion prevention systems by …
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement
X Liu, J Ren, H He, Q Wang, C Song - Computers & Security, 2021 - Elsevier
Distributed denial of service (DDoS) attacks have been a typical and extremely destructive
threat to the Internet. DDoS attack detections suffer from the nonnegligible high complexity of …
threat to the Internet. DDoS attack detections suffer from the nonnegligible high complexity of …
LTE/LTE-A network security data collection and analysis for security measurement: A survey
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …
for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency …
Real time DDoS detection using fuzzy estimators
We propose a method for DDoS detection by constructing a fuzzy estimator on the mean
packet inter arrival times. We divided the problem into two challenges, the first being the …
packet inter arrival times. We divided the problem into two challenges, the first being the …
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel
X Liu, J Ren, H He, B Zhang, C Song… - Journal of Network and …, 2021 - Elsevier
DDoS attack detection methods play a very important role in protecting computer network
security. However, the existing flow-based DDoS attack detection methods face the non …
security. However, the existing flow-based DDoS attack detection methods face the non …
Detecting anomalous behavior in VoIP systems: A discrete event system modeling
D Golait, N Hubballi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Session initiation protocol (SIP) is an application layer protocol used for signaling purposes
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …
A comprehensive study of flooding attack consequences and countermeasures in session initiation protocol (sip)
Abstract Session Initiation Protocol (SIP) is widely used as a signaling protocol to support
voice and video communication in addition to other multimedia applications. However, it is …
voice and video communication in addition to other multimedia applications. However, it is …
Quick detection of stealthy SIP flooding attacks in VoIP networks
Denial of Service (DoS) attacks such as the SIP flooding pose great threats to normal
operations of VoIP networks, and can bear various forms to elude detection. In this paper …
operations of VoIP networks, and can bear various forms to elude detection. In this paper …