DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …
against Web applications. A large number of these attacks aim to exhaust the network …
A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism
IM Tas, BG Unsalver, S Baktir - IEEE access, 2020 - ieeexplore.ieee.org
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some
less known SIP features by using the IP-spoofing technique, the reflection based attack logic …
less known SIP features by using the IP-spoofing technique, the reflection based attack logic …
Countering ddos attacks in sip based voip networks using recurrent neural networks
Many companies have transformed their telephone systems into Voice over IP (VoIP)
systems. Although implementation is simple, VoIP is vulnerable to different types of attacks …
systems. Although implementation is simple, VoIP is vulnerable to different types of attacks …
A novel approach for efficient mitigation against the SIP-based DRDoS attack
IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …
widely deployed technologies since they provide an efficient and fast means of both voice …
A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems
OS Younes - Computer Networks, 2024 - Elsevier
Abstract The Session Initiation Protocol (SIP) is widely used for multimedia communication
as a signaling protocol to manage, establish, maintain, and terminate multimedia sessions …
as a signaling protocol to manage, establish, maintain, and terminate multimedia sessions …
Battling against DDoS in SIP: Is Machine Learning-based detection an effective weapon?
This paper focuses on network anomaly-detection and especially the effectiveness of
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …
Machine Learning (ML) techniques in detecting Denial of Service (DoS) in SIP-based VoIP …
Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks
IM Tas, S Baktir - IEEE Access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies
IM Tas, B Ugurdogan, S Baktir - Computers & Security, 2016 - Elsevier
Abstract Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques
have become popular in recent years. VoIP/SIP techniques are used widely in unified …
have become popular in recent years. VoIP/SIP techniques are used widely in unified …
[PDF][PDF] A selective defense for mitigating coordinated call attacks
Telephony Denial of Service (TDoS) attack is a form of Denial of Service (DoS) attack that
targets telephone services, such as Voice over IP (VoIP), not allowing legitimate users to …
targets telephone services, such as Voice over IP (VoIP), not allowing legitimate users to …
An efficient architecture for dynamic middlebox policy enforcement in SDN networks
Middleboxes are widely deployed devices that play crucial roles in today's networks. Their
behavior is commonly determined by policies that are manually set by network …
behavior is commonly determined by policies that are manually set by network …