scispace - formally typeset
Journal ArticleDOI

Survey of network security systems to counter SIP-based denial-of-service attacks

TLDR
It is shown that there are possible solutions for both payload and flow tampering attacks, and partial solutions for message flooding attacks, as well as giving hints how open flooding attacks issues could be addressed.
About
This article is published in Computers & Security.The article was published on 2010-03-01. It has received 107 citations till now. The article focuses on the topics: Denial-of-service attack & Session Initiation Protocol.

read more

Citations
More filters
Journal ArticleDOI

A Survey of SIP Authentication and Key Agreement Schemes

TL;DR: This work identified, categorized and evaluated various SIP authentication and key agreement protocols according to their performance and security features, and observed that there are successful schemes from both the performance andSecurity viewpoint.
Journal ArticleDOI

Distributed denial of service attacks and its defenses in IoT: a survey

TL;DR: This survey is a comprehensive approach which includes general DDoS attack motivations and specific reasons why attackers prefer IoT devices to launch DDoS attacks, and proposes to implement an essential first line of defense for IoT devices.
Journal ArticleDOI

An intelligent cyber security system against DDoS attacks in SIP networks

TL;DR: A novel adaptive real time change-point model that tracks the changes in Mahalanobis distances between sampled feature vectors in the monitored system accounts for possible DDoS attacks and a clustering model that runs over the similarity scores of behavioral patterns between the users is used to segregate the malicious from the innocent.
Journal ArticleDOI

A review of cyber threats and defence approaches in emergency management

TL;DR: This work provides a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management and emphasise on open issues for research, which have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature.
Journal ArticleDOI

A Bayesian change point model for detecting SIP-based DDoS attacks

TL;DR: A DDoS attack detection framework based on the Bayesian multiple change model, which can detect different types of flooding attacks, and a probabilistic SIP network simulation system that provides a test environment for network security tools is proposed.
References
More filters

RTP: A Transport Protocol for Real-Time Applications

TL;DR: RTP provides end-to-end network transport functions suitable for applications transmitting real-time data over multicast or unicast network services and is augmented by a control protocol (RTCP) to allow monitoring of the data delivery in a manner scalable to large multicast networks.
Journal ArticleDOI

Continuous inspection schemes

Proceedings Article

Snort - Lightweight Intrusion Detection for Networks

TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.

Security Architecture for the Internet Protocol

R. Atkinson
TL;DR: This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer, and obsoletes RFC 2401 (November 1998).
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Related Papers (5)