scispace - formally typeset
H

Hemant Sengar

Researcher at George Mason University

Publications -  15
Citations -  494

Hemant Sengar is an academic researcher from George Mason University. The author has contributed to research in topics: Voice over IP & The Internet. The author has an hindex of 9, co-authored 15 publications receiving 483 citations.

Papers
More filters
Journal ArticleDOI

Detecting VoIP Floods Using the Hellinger Distance

TL;DR: The VoIP flooding detection system (vFDS) is offered-an online statistical anomaly detection framework that generates alerts based on abnormal variations in a selected hybrid collection of traffic flows that does so by viewing collections of related packet streams as evolving probability distributions.
Proceedings ArticleDOI

VoIP Intrusion Detection Through Interacting Protocol State Machines

TL;DR: This paper proposes a highly-needed VoIP intrusion detection system that utilizes not only the state machines of network protocols but also the interaction among them for intrusion detection, and shows promising detection characteristics and low runtime impact on the perceived quality of voice streams.
Proceedings ArticleDOI

Fast Detection of Denial-of-Service Attacks on IP Telephony

TL;DR: This paper presents an online statistical detection mechanism, called vFDS, to detect DoS attacks in the context of VoIP, based on Hellinger distance method, which computes the variability between two probability measures.
Proceedings ArticleDOI

Online detection of network traffic anomalies using behavioral distance

TL;DR: A behavioral distance based anomaly detection mechanism with the capability of performing on-line traffic analysis and validate the efficacy of the detection system by using network traffic traces collected at Abilene and MAWI high-speed links.
Book ChapterDOI

Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks

TL;DR: Two approaches to detect and prevent SPITting over the Internet are presented, based on the anomaly detection of the distributions of selected call features, which can be used to build a fairly general and effective anomalous call behavior detection framework.