H
Hemant Sengar
Researcher at George Mason University
Publications - 15
Citations - 494
Hemant Sengar is an academic researcher from George Mason University. The author has contributed to research in topics: Voice over IP & The Internet. The author has an hindex of 9, co-authored 15 publications receiving 483 citations.
Papers
More filters
Journal ArticleDOI
Detecting VoIP Floods Using the Hellinger Distance
TL;DR: The VoIP flooding detection system (vFDS) is offered-an online statistical anomaly detection framework that generates alerts based on abnormal variations in a selected hybrid collection of traffic flows that does so by viewing collections of related packet streams as evolving probability distributions.
Proceedings ArticleDOI
VoIP Intrusion Detection Through Interacting Protocol State Machines
TL;DR: This paper proposes a highly-needed VoIP intrusion detection system that utilizes not only the state machines of network protocols but also the interaction among them for intrusion detection, and shows promising detection characteristics and low runtime impact on the perceived quality of voice streams.
Proceedings ArticleDOI
Fast Detection of Denial-of-Service Attacks on IP Telephony
TL;DR: This paper presents an online statistical detection mechanism, called vFDS, to detect DoS attacks in the context of VoIP, based on Hellinger distance method, which computes the variability between two probability measures.
Proceedings ArticleDOI
Online detection of network traffic anomalies using behavioral distance
TL;DR: A behavioral distance based anomaly detection mechanism with the capability of performing on-line traffic analysis and validate the efficacy of the detection system by using network traffic traces collected at Abilene and MAWI high-speed links.
Book ChapterDOI
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks
TL;DR: Two approaches to detect and prevent SPITting over the Internet are presented, based on the anomaly detection of the distributions of selected call features, which can be used to build a fairly general and effective anomalous call behavior detection framework.