DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications

A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …

A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism

IM Tas, BG Unsalver, S Baktir - IEEE access, 2020 - ieeexplore.ieee.org
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some
less known SIP features by using the IP-spoofing technique, the reflection based attack logic …

Countering ddos attacks in sip based voip networks using recurrent neural networks

W Nazih, Y Hifny, WS Elkilani, H Dhahri, T Abdelkader - Sensors, 2020 - mdpi.com
Many companies have transformed their telephone systems into Voice over IP (VoIP)
systems. Although implementation is simple, VoIP is vulnerable to different types of attacks …

A novel approach for efficient mitigation against the SIP-based DRDoS attack

IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …

A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems

OS Younes - Computer Networks, 2024 - Elsevier
Abstract The Session Initiation Protocol (SIP) is widely used for multimedia communication
as a signaling protocol to manage, establish, maintain, and terminate multimedia sessions …

Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?

Z Tsiatsikas, A Fakis… - … Joint Conference on …, 2015 - ieeexplore.ieee.org
This paper focuses on network anomaly-detection and especially the effectiveness of
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …

Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks

IM Tas, S Baktir - IEEE Access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …

Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies

IM Tas, B Ugurdogan, S Baktir - Computers & Security, 2016 - Elsevier
Abstract Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques
have become popular in recent years. VoIP/SIP techniques are used widely in unified …

[PDF][PDF] A selective defense for mitigating coordinated call attacks

MOO Lemos, YG Dantas, I Fonseca, V Nigam… - … on Computer Networks …, 2016 - nigam.info
Telephony Denial of Service (TDoS) attack is a form of Denial of Service (DoS) attack that
targets telephone services, such as Voice over IP (VoIP), not allowing legitimate users to …

An efficient architecture for dynamic middlebox policy enforcement in SDN networks

AJ Pinheiro, EB Gondim, DR Campelo - Computer Networks, 2017 - Elsevier
Middleboxes are widely deployed devices that play crucial roles in today's networks. Their
behavior is commonly determined by policies that are manually set by network …