The document discusses techniques for detecting denial-of-service (DoS) attacks in Session Initiation Protocol (SIP)-based Voice over IP (VoIP) networks. It reviews several proposed detection mechanisms, including statistical detection using Hellinger's distance, a double-layered architecture using traffic scanning, and a distributed filtering mechanism. It also summarizes a mitigation mechanism that analyzes SIP messages and calls and a technique using entropy analysis to identify attacks. Overall, the document surveys different existing approaches for detecting DoS attacks that aim to disrupt availability in SIP-based VoIP networks.
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address.
Askozia VoIP Security white paper - 2017, EnglishAskozia
Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure also carries risks affecting the security and integrity of your IP services. As IT networks are targeted by attackers, insufficient prevention can endanger not only your network but your telecommunication infrastructure that is build on top of it. This paper aims to educate about possible risks, common attacks and how to prevent them from being successful.
1) VoIP conversations are vulnerable to eavesdropping attacks where an attacker can detect phrases in a conversation without hearing the actual audio. Phrase spotting techniques allow this by analyzing encoded voice data.
2) To defend against eavesdropping, the authors propose padding packets to a fixed length and applying encryption. Low bit rate sections of audio are padded and noise is added before encryption.
3) At the receiver, noise is removed after decryption to reconstruct the original audio. Simulation results show this technique reduces errors compared to no defense. Implementing stronger encryption algorithms could further improve security.
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
1) The document discusses security challenges and threats in VoIP networks, including eavesdropping, toll fraud, denial of service attacks, spam over internet telephony, and pharming attacks.
2) It proposes several defense measures to prevent these threats, such as intrusion detection systems, filtering techniques to resist spam, and load balancing algorithms to mitigate flash crowd attacks.
3) The vulnerabilities of VoIP networks arise because they use the open Internet for transmission, leaving them exposed to the security issues that exist on IP-based networks.
This document discusses a fraud monitoring system for voice over internet protocol (VoIP) telephony. It begins with an introduction to VoIP and defines fraud. It then discusses the history of VoIP and how VoIP connections work. Key points discussed include quality of service requirements, protocols used in VoIP like SIP and H.323, and security challenges like dynamic addressing and firewalls. The document examines how a fraud management system could address these security issues to help secure VoIP networks.
This document provides an overview of Denial of Service (DoS) attacks on Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) infrastructure. It first introduces VoIP and SIP, describing SIP components and messages. It then discusses security issues with SIP such as eavesdropping, message tampering, and spoofing. Several types of SIP DoS attacks are classified, including SIP message payload tampering, SIP message flow tampering, and SIP message flooding attacks. The document concludes by stating that SIP DoS attacks can render SIP services inoperable and discussing previous work on analyzing the robustness of SIP servers under DoS attacks.
This document provides an overview of distributed denial of service (DDoS) attacks, including how they work, common techniques used, and strategies for mitigating them. It defines DDoS attacks as attempts to exhaust the resources of networks, applications, or services to deny access to legitimate users. The document discusses how botnets are commonly used to launch large-scale DDoS attacks from multiple sources simultaneously. It also outlines best practices for selecting DDoS protection devices, emphasizing the importance of up-to-date detection techniques, low latency, and customized hardware-based logic to withstand major attacks.
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
The invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in VoIP malicious attacks is the most difficult task, due to its associated features with converged network. In this paper, a Model of investigating VoIP malicious attacks is proposed for forensic analysis. VoIP spoofing is being a common and most important threat to the VoIP users. It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). A design of a SIP which will try to capture all of the data on a VoIP network and process it for forensic analysis with also detection of the spoofing or the fake caller address.
Askozia VoIP Security white paper - 2017, EnglishAskozia
Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure also carries risks affecting the security and integrity of your IP services. As IT networks are targeted by attackers, insufficient prevention can endanger not only your network but your telecommunication infrastructure that is build on top of it. This paper aims to educate about possible risks, common attacks and how to prevent them from being successful.
1) VoIP conversations are vulnerable to eavesdropping attacks where an attacker can detect phrases in a conversation without hearing the actual audio. Phrase spotting techniques allow this by analyzing encoded voice data.
2) To defend against eavesdropping, the authors propose padding packets to a fixed length and applying encryption. Low bit rate sections of audio are padded and noise is added before encryption.
3) At the receiver, noise is removed after decryption to reconstruct the original audio. Simulation results show this technique reduces errors compared to no defense. Implementing stronger encryption algorithms could further improve security.
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
1) The document discusses security challenges and threats in VoIP networks, including eavesdropping, toll fraud, denial of service attacks, spam over internet telephony, and pharming attacks.
2) It proposes several defense measures to prevent these threats, such as intrusion detection systems, filtering techniques to resist spam, and load balancing algorithms to mitigate flash crowd attacks.
3) The vulnerabilities of VoIP networks arise because they use the open Internet for transmission, leaving them exposed to the security issues that exist on IP-based networks.
This document discusses a fraud monitoring system for voice over internet protocol (VoIP) telephony. It begins with an introduction to VoIP and defines fraud. It then discusses the history of VoIP and how VoIP connections work. Key points discussed include quality of service requirements, protocols used in VoIP like SIP and H.323, and security challenges like dynamic addressing and firewalls. The document examines how a fraud management system could address these security issues to help secure VoIP networks.
This document provides an overview of Denial of Service (DoS) attacks on Session Initiation Protocol (SIP) based Voice over Internet Protocol (VoIP) infrastructure. It first introduces VoIP and SIP, describing SIP components and messages. It then discusses security issues with SIP such as eavesdropping, message tampering, and spoofing. Several types of SIP DoS attacks are classified, including SIP message payload tampering, SIP message flow tampering, and SIP message flooding attacks. The document concludes by stating that SIP DoS attacks can render SIP services inoperable and discussing previous work on analyzing the robustness of SIP servers under DoS attacks.
This document provides an overview of distributed denial of service (DDoS) attacks, including how they work, common techniques used, and strategies for mitigating them. It defines DDoS attacks as attempts to exhaust the resources of networks, applications, or services to deny access to legitimate users. The document discusses how botnets are commonly used to launch large-scale DDoS attacks from multiple sources simultaneously. It also outlines best practices for selecting DDoS protection devices, emphasizing the importance of up-to-date detection techniques, low latency, and customized hardware-based logic to withstand major attacks.
This document discusses security issues related to Voice over IP (VoIP) networks. It begins by noting some common security threats to VoIP like denial of service attacks, viruses, fraud, and eavesdropping. It then discusses how these threats can be addressed through techniques like access control, authentication, encryption, and admission control. The document argues that security is a complex issue and that investments should be made based on business needs and risk levels for different service providers and network types. It promotes session border controllers as a way for service providers to help ensure security.
VoIP security involves threats like denial of service attacks, eavesdropping, and quality of service issues. Best practices include using firewalls with application layer gateways or session border controllers, encrypting media and signaling, prioritizing bandwidth for VoIP, and restricting access to call managers through physical and logical security measures. NIST recommends logically separate networks, endpoint encryption, and avoiding vulnerabilities in softphones and wireless networks without encryption.
This document contains frequently asked questions about Allot ServiceProtector and how it detects and mitigates cyberattacks such as DDoS attacks and outgoing spam. It discusses how Allot ServiceProtector uses network behavior anomaly detection and host behavior anomaly detection to identify attacks without relying on signatures. It also addresses questions around false positives, differences from IPS systems, ability to detect different attack types, and typical deployment considerations.
A firewall protects a network by blocking unauthorized access, while an intrusion detection system (IDS) detects intrusion attempts without blocking. A firewall can block connections, while an IDS only detects packets and alerts administrators. Firewalls perform actions like blocking and filtering, while IDSs just detect connections. IDS types include network IDS, host IDS, and protocol/anomaly-based IDS, while firewall types include packet filtering, stateful inspection, and application firewalls.
This document summarizes the authors' experience over two years fuzzing VoIP devices to discover vulnerabilities. They used their in-house tool KIF to conduct stateful protocol fuzzing on a variety of VoIP equipment. The testing uncovered many vulnerabilities related to weak input validation, including buffer overflows and format string issues. Some vulnerabilities allowed compromising internal networks by exploiting unfiltered web interfaces on VoIP phones. The authors disclosed vulnerabilities responsibly and provided mitigation techniques.
This document summarizes a research paper that proposes a technique to detect IP spoofing attacks using router-based information. The technique scans incoming IP packets without cryptography to identify spoofed packets based on analyzing the route taken by each packet. IP spoofing is commonly used in denial of service attacks to conceal attacking sources. Existing host-based defenses are insufficient and filtering spoofed packets at the network layer is important to protect against DDoS attacks. The proposed technique aims to filter out bogus traffic with a low false positive rate by leveraging route information analyzed during packet processing.
Session Initiation Protocol (SIP) is a protocol for signalling multimedia sessions
with one or more participants. SIP is an application layer control protocol to initiate
and control user sessions. It is used in call set-up signalling for IP telephony, instead
of SS7 for circuit switching network. SIP is becoming popular in IP networking.
This paper presents and analyses some threats and attacks that SIP is vulnerable to.
These threats and attacks set the requirements for security mechanisms that are used
to make SIP more secure. This paper examines some of these security mechanisms.
In order to present and analyse the security threats and the security mechanisms they
are divided into different aspects of security. Privacy protection issues of SIP are also
discussed in this paper.
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
This document discusses techniques for detecting session hijacking and IP spoofing attacks in wireless networks. It proposes using sensor nodes to detect fake access points, which are used to perform session hijacking. It also describes adding protection against IP spoofing through public-private key cryptography during key exchange. The document provides background on session hijacking, IP spoofing, and related work on detecting these attacks. It then describes the proposed mechanism in more detail.
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
This document discusses a wireless LAN intrusion detection and prevention system for malicious access points. It aims to automatically detect and block rogue access points on a network, while also protecting unprotected clients. The system uses a whitelist containing authorized clients and compares IP addresses, SSIDs, detection/prevention times, and MAC addresses of access points and clients to identify unauthorized ones. It examines different techniques for detecting malicious access points and implements a lightweight server-side and client-side solution to efficiently detect and prevent malicious access points and protect unprotected clients, including detecting live attacks. The system aims to address limitations of prior work that only protected the client-side or server-side individually.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
This document is a security glossary from Razorpoint Security Technologies containing definitions of common security, hacking, and technology terms. It was last updated on January 9, 2006 and contains copyright information. The glossary contains over 150 terms spanning operating systems, networks, and technologies to help people understand the latest security terminology. If the reader has any other terms they would like defined, they can contact Razorpoint Security.
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks.
SIP (Session Initial Protocol) is an IETF standard used to initiate multimedia communication sessions over the internet. It establishes and terminates voice or video calls between two or more participants. SIP also allows modification of existing calls, such as adding or removing participants. Key network elements that enable SIP connectivity include user agents, SIP phones, proxy servers, registrars, and gateways.
This document discusses the importance of Session Border Controllers (SBCs) for Voice over Internet Protocol (VoIP) networks. It outlines how SBCs provide session control, security, interoperability, and demarcation. SBCs help protect against various VoIP threats like denial of service attacks, spoofing, and toll fraud. They can filter traffic, authenticate users, and enforce policies to secure VoIP infrastructure and services. The document also compares SBCs to traditional firewalls and explains how SBCs can better handle real-time multimedia communications.
SIP Threat Management device which is released by ALLO.COM is installed in front of any SIP based PBX system or VOIP gateway and offers extra layers of security against numerous types of attacks that are targeted towards IP telephony infrastructure. The features offered by the STM complement those of a traditional firewall or UTM, and it can be installed in conjunction with a UTM.
Instead of losing thousands of dollars due to the victim of VOIP attacks, invest on 300$ worth of ALLO STM, which is plug & play.
Investing in an STM to protect your communications network is a must.
Lecture presented by Chito N. Angeles at PAARL's Conference on the theme "The Power of Convergence: Technology and Connectivity in the 21st Century Library and Information Services" held on Nov. 11-13, 2009 at St Paul College, Pasig City
An Identity-Based Mutual Authentication with Key Agreementijtsrd
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key xor data transpose technique. By using this technique, we provide more security and more efficiency for transferring data. B. V. S. Manikya Rao | Y. Triveni "An Identity-Based Mutual Authentication with Key Agreement" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21562.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/21562/an-identity-based-mutual-authentication-with-key-agreement/b-v-s-manikya-rao
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks.
Any attacker can have complete control over the communication channel, listen to phone calls, read email,
and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a
middleware security system that aims to protect the GSM communication channel and minimize the
computational overheads of the provided authentication and cryptographic schemes of the network The
proposed scheme supports an end-to-end secured communication between the GSM mobile devices and the
GSM base stations; insure compatibility between wireless GSM devices (telephones, PDAs, etc.), and easy
to install without any modification of the current systems
Current trends and innovations in voice over IPALTANAI BISHT
Learn how to implement an open-source webrtc Click to dial or VOIP setup for their enterprises and also the new innovative add-on tech available for a basic VOIP system such as auto-attendants.
VoIP vs Telecom Providers
SIP Servers types
Open-source tool and technologies in VOIP
Opensip
Kamailio
Freeswitch
Media Handling
Webrtc
Machine learning in VoIP
Call Classifier
Fraud Detector
NLP and Auto attendants
VoIP to telecom bridging
This document discusses VoIP (Voice over Internet Protocol) technology, including its challenges and applications. It covers topics like reliability issues, quality of service, fax transmission, emergency call handling, security concerns, case studies, and the VoIP market. Solutions proposed include improving network infrastructure, prioritizing emergency calls, encrypting VoIP traffic, and segmenting voice and data networks. The VoIP market is projected to grow significantly due to lower costs and the emergence of new communication services.
GENBAND has implemented a multi-layer security architecture and threat mitigation solution using session border controllers to protect VoIP networks from security vulnerabilities like denial of service attacks, theft of service, and others. The solution uses deep packet inspection, access control, topology hiding, and other methods at the network, session, and application layers to detect and prevent a wide range of threats. It can process traffic at wire speeds even during attacks to minimize disruption.
Voice over IP (VOIP) Security Research- A ResearchIJMER
This document summarizes research on Voice over IP (VoIP) security. It begins with an overview of SIP (Session Initiation Protocol), a commonly used VoIP standard, and a taxonomy of VoIP security threats. It then surveys existing research on VoIP security classified according to the threat categories. The research covers threats like eavesdropping, denial of service attacks, toll fraud, and spam over IP telephony (SPIT). Approaches studied include encryption, authentication, reputation systems, audio fingerprinting, and Turing tests to detect automated SPIT callers. The goal is to identify gaps and guide future work on analyzing VoIP attackers and improving the security and resilience of VoIP systems.
This document discusses security issues related to Voice over IP (VoIP) networks. It begins by noting some common security threats to VoIP like denial of service attacks, viruses, fraud, and eavesdropping. It then discusses how these threats can be addressed through techniques like access control, authentication, encryption, and admission control. The document argues that security is a complex issue and that investments should be made based on business needs and risk levels for different service providers and network types. It promotes session border controllers as a way for service providers to help ensure security.
VoIP security involves threats like denial of service attacks, eavesdropping, and quality of service issues. Best practices include using firewalls with application layer gateways or session border controllers, encrypting media and signaling, prioritizing bandwidth for VoIP, and restricting access to call managers through physical and logical security measures. NIST recommends logically separate networks, endpoint encryption, and avoiding vulnerabilities in softphones and wireless networks without encryption.
This document contains frequently asked questions about Allot ServiceProtector and how it detects and mitigates cyberattacks such as DDoS attacks and outgoing spam. It discusses how Allot ServiceProtector uses network behavior anomaly detection and host behavior anomaly detection to identify attacks without relying on signatures. It also addresses questions around false positives, differences from IPS systems, ability to detect different attack types, and typical deployment considerations.
A firewall protects a network by blocking unauthorized access, while an intrusion detection system (IDS) detects intrusion attempts without blocking. A firewall can block connections, while an IDS only detects packets and alerts administrators. Firewalls perform actions like blocking and filtering, while IDSs just detect connections. IDS types include network IDS, host IDS, and protocol/anomaly-based IDS, while firewall types include packet filtering, stateful inspection, and application firewalls.
This document summarizes the authors' experience over two years fuzzing VoIP devices to discover vulnerabilities. They used their in-house tool KIF to conduct stateful protocol fuzzing on a variety of VoIP equipment. The testing uncovered many vulnerabilities related to weak input validation, including buffer overflows and format string issues. Some vulnerabilities allowed compromising internal networks by exploiting unfiltered web interfaces on VoIP phones. The authors disclosed vulnerabilities responsibly and provided mitigation techniques.
This document summarizes a research paper that proposes a technique to detect IP spoofing attacks using router-based information. The technique scans incoming IP packets without cryptography to identify spoofed packets based on analyzing the route taken by each packet. IP spoofing is commonly used in denial of service attacks to conceal attacking sources. Existing host-based defenses are insufficient and filtering spoofed packets at the network layer is important to protect against DDoS attacks. The proposed technique aims to filter out bogus traffic with a low false positive rate by leveraging route information analyzed during packet processing.
Session Initiation Protocol (SIP) is a protocol for signalling multimedia sessions
with one or more participants. SIP is an application layer control protocol to initiate
and control user sessions. It is used in call set-up signalling for IP telephony, instead
of SS7 for circuit switching network. SIP is becoming popular in IP networking.
This paper presents and analyses some threats and attacks that SIP is vulnerable to.
These threats and attacks set the requirements for security mechanisms that are used
to make SIP more secure. This paper examines some of these security mechanisms.
In order to present and analyse the security threats and the security mechanisms they
are divided into different aspects of security. Privacy protection issues of SIP are also
discussed in this paper.
Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptog...IOSR Journals
This document discusses techniques for detecting session hijacking and IP spoofing attacks in wireless networks. It proposes using sensor nodes to detect fake access points, which are used to perform session hijacking. It also describes adding protection against IP spoofing through public-private key cryptography during key exchange. The document provides background on session hijacking, IP spoofing, and related work on detecting these attacks. It then describes the proposed mechanism in more detail.
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
This document discusses a wireless LAN intrusion detection and prevention system for malicious access points. It aims to automatically detect and block rogue access points on a network, while also protecting unprotected clients. The system uses a whitelist containing authorized clients and compares IP addresses, SSIDs, detection/prevention times, and MAC addresses of access points and clients to identify unauthorized ones. It examines different techniques for detecting malicious access points and implements a lightweight server-side and client-side solution to efficiently detect and prevent malicious access points and protect unprotected clients, including detecting live attacks. The system aims to address limitations of prior work that only protected the client-side or server-side individually.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
This document is a security glossary from Razorpoint Security Technologies containing definitions of common security, hacking, and technology terms. It was last updated on January 9, 2006 and contains copyright information. The glossary contains over 150 terms spanning operating systems, networks, and technologies to help people understand the latest security terminology. If the reader has any other terms they would like defined, they can contact Razorpoint Security.
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks.
SIP (Session Initial Protocol) is an IETF standard used to initiate multimedia communication sessions over the internet. It establishes and terminates voice or video calls between two or more participants. SIP also allows modification of existing calls, such as adding or removing participants. Key network elements that enable SIP connectivity include user agents, SIP phones, proxy servers, registrars, and gateways.
This document discusses the importance of Session Border Controllers (SBCs) for Voice over Internet Protocol (VoIP) networks. It outlines how SBCs provide session control, security, interoperability, and demarcation. SBCs help protect against various VoIP threats like denial of service attacks, spoofing, and toll fraud. They can filter traffic, authenticate users, and enforce policies to secure VoIP infrastructure and services. The document also compares SBCs to traditional firewalls and explains how SBCs can better handle real-time multimedia communications.
SIP Threat Management device which is released by ALLO.COM is installed in front of any SIP based PBX system or VOIP gateway and offers extra layers of security against numerous types of attacks that are targeted towards IP telephony infrastructure. The features offered by the STM complement those of a traditional firewall or UTM, and it can be installed in conjunction with a UTM.
Instead of losing thousands of dollars due to the victim of VOIP attacks, invest on 300$ worth of ALLO STM, which is plug & play.
Investing in an STM to protect your communications network is a must.
Lecture presented by Chito N. Angeles at PAARL's Conference on the theme "The Power of Convergence: Technology and Connectivity in the 21st Century Library and Information Services" held on Nov. 11-13, 2009 at St Paul College, Pasig City
An Identity-Based Mutual Authentication with Key Agreementijtsrd
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key xor data transpose technique. By using this technique, we provide more security and more efficiency for transferring data. B. V. S. Manikya Rao | Y. Triveni "An Identity-Based Mutual Authentication with Key Agreement" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21562.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-security/21562/an-identity-based-mutual-authentication-with-key-agreement/b-v-s-manikya-rao
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks.
Any attacker can have complete control over the communication channel, listen to phone calls, read email,
and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a
middleware security system that aims to protect the GSM communication channel and minimize the
computational overheads of the provided authentication and cryptographic schemes of the network The
proposed scheme supports an end-to-end secured communication between the GSM mobile devices and the
GSM base stations; insure compatibility between wireless GSM devices (telephones, PDAs, etc.), and easy
to install without any modification of the current systems
Current trends and innovations in voice over IPALTANAI BISHT
Learn how to implement an open-source webrtc Click to dial or VOIP setup for their enterprises and also the new innovative add-on tech available for a basic VOIP system such as auto-attendants.
VoIP vs Telecom Providers
SIP Servers types
Open-source tool and technologies in VOIP
Opensip
Kamailio
Freeswitch
Media Handling
Webrtc
Machine learning in VoIP
Call Classifier
Fraud Detector
NLP and Auto attendants
VoIP to telecom bridging
This document discusses VoIP (Voice over Internet Protocol) technology, including its challenges and applications. It covers topics like reliability issues, quality of service, fax transmission, emergency call handling, security concerns, case studies, and the VoIP market. Solutions proposed include improving network infrastructure, prioritizing emergency calls, encrypting VoIP traffic, and segmenting voice and data networks. The VoIP market is projected to grow significantly due to lower costs and the emergence of new communication services.
GENBAND has implemented a multi-layer security architecture and threat mitigation solution using session border controllers to protect VoIP networks from security vulnerabilities like denial of service attacks, theft of service, and others. The solution uses deep packet inspection, access control, topology hiding, and other methods at the network, session, and application layers to detect and prevent a wide range of threats. It can process traffic at wire speeds even during attacks to minimize disruption.
Voice over IP (VOIP) Security Research- A ResearchIJMER
This document summarizes research on Voice over IP (VoIP) security. It begins with an overview of SIP (Session Initiation Protocol), a commonly used VoIP standard, and a taxonomy of VoIP security threats. It then surveys existing research on VoIP security classified according to the threat categories. The research covers threats like eavesdropping, denial of service attacks, toll fraud, and spam over IP telephony (SPIT). Approaches studied include encryption, authentication, reputation systems, audio fingerprinting, and Turing tests to detect automated SPIT callers. The goal is to identify gaps and guide future work on analyzing VoIP attackers and improving the security and resilience of VoIP systems.
VoIP security threats include vulnerabilities in confidentiality, integrity, and availability. Confidentiality can be impacted at the data link layer through ARP and at the network layer through IP address spoofing. Integrity risks include replay attacks at the transport layer. Availability risks include bandwidth consumption attacks and resource starvation attacks. VoIP security tools like SiVuS and c07-sip can help test for vulnerabilities, but have limitations and are still evolving as VoIP adoption increases. Proper security precautions are important as VoIP systems become more prevalent.
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking
networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto
standard for communication on the Internet. The underlying vulnerabilities in the protocols is the root cause of intrusions. Therefor
Intrusion detection system becomes an important element in network security that controls real time data and leads to huge
dimensional problem. Processing large number of packets and data in real time is very difficult and costly. Therefor data preprocessing
is necessary to remove redundant and unwanted information from packets and clean network data. Here, we are focusing on
two important aspects of intrusion detection; one is accuracy and other is performance. The layered approach of TCP/IP model can be
applied to packet pre-processing to achieve early and faster intrusion detection. Motivation for the paper comes from the large impact
data preprocessing has on the accuracy and capability of anomaly-based NIPS. In this paper it is demonstrated that high attack
detection accuracy can be achieved by using layered approach for data preprocessing in Internet. To reduce false positive rate and to
increase efficiency of detection, the paper proposed framework for preprocessing in intrusion prevention system. We experimented
with real time network traffic as well as he KDDcup99 dataset for our research.
This document discusses security issues related to Voice over Internet Protocol (VoIP). It begins by explaining what VoIP is and some of its early implementations. It then describes the basic protocols and protocol stacks used for VoIP signaling and sessions, including H.323, SIP, and RTP. The document outlines various roles in VoIP systems, such as administrators and operators. It identifies common attacks against VoIP networks like theft of service, man-in-the-middle attacks, IP spoofing, and denial-of-service attacks. It concludes that VoIP inherits security vulnerabilities from the Internet and that encryption, authentication, firewalls, and separating voice and data traffic are needed to secure VoIP networks.
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc ...
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
Abstract
Voice over Internet Protocol (VoIP) is an advanced telecommunication technology which transfers the voice/video over
high speed network that provides advantages of flexibility, reliability and cost efficient advanced telecommunication
features. Still the issues related to security are averting many organizations to accept VoIP cloud environment due to
security threats, holes or vulnerabilities. So, the novel secured framework is absolutely necessary to prevent all kind of
VoIP security issues. This paper points out the existing VoIP cloud architecture and various security attacks and issues
in the existing framework. It also presents the defense mechanisms to prevent the attacks and proposes a new security
framework called Intrusion Prevention System (IPS) using video watermarking and extraction technique and Liveness
Voice Detection (LVD) technique with biometric features such as face and voice. IPSs updated with new LVD features
protect the VoIP services not only from attacks but also from misuses.
A Comprehensive Survey of Security Issues and
Defense Framework for VoIP Cloud
Ashutosh Satapathy* and L. M. Jenila Livingston
School of Computing Science and Engineering, VIT University, Chennai - 600127, Tamil Nadu, India;
[email protected], [email protected]
Keywords: Defense Mechanisms, Liveness Voice Detection, VoIP Cloud, Voice over Internet Protocol, VoIP Security Issues
1. Introduction
The rapid progress of VoIP over traditional services is
led to a situation that is common to many innovations
and new technologies such as VoIP cloud and peer to
peer services like Skype, Google Hangout etc. VoIP is the
technology that supports sending voice (and video) over
an Internet protocol-based network1,2. This is completely
different than the public circuit-switched telephone net-
work. Circuit switching network allocates resources to
each individual call and path is permanent throughout
the call from start to end. Traditional telephony services
are provided by the protocols/components such as SS7, T
carriers, Plain Old Telephone Service (POTS), the Public
Switch Telephone Network (PSTN), dial up, local loops
and anything under International Telecommunication
Union. IP networks are based on packet switching and
each packet follows different path, has its own header and
is forwarded separately by routers. VoIP network can be
constructed in various ways by using both proprietary
protocols and protocols based on open standards.
1.1 VoIP Layer Architecture
VoIP communication system typically consist of a front
end platform (soft-phone, PBX, gateway, call manager),
back end platform (server, CPU, storage, memory, net-
work) and intermediate platforms such as VoIP protocols,
database, authentication server, web server, operating sys-
tems etc. It is mainly divided into five layers as shown in
Figure1.
1.2 VoIP Cloud Architecture
VoIP cloud is the framework for delivering telephony
services in which resourc.
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKScscpconf
In this age of gigabit Ethernet and broadband internet, network security has been the top
priority for most of the researchers. Technology advancements have advantages as well as
disadvantages. Most of the communication of present world, the e-world, takes place online,
through the internet. Thus the context of network intrusions and attacks to hack into servers also
came into existence. A technique to perform this activity is made possible by preventing the
discovery of the sender’s identity through IP Spoofing [7]. Many popular internet sites have
been hacked and attackers try to forge or spoof the source addresses in IP packets. Using
spoofing detection technique, the user can retrieve the list of IP addresses and able to identify
the malicious IP addresses.Hence mechanisms must be designed to prevent hacking. This paper
proposes a novel technique to detect IP spoofing based on traffic verification and filtering
An SBC provides security for VoIP networks by applying policies between trusted and untrusted networks like the Internet and private LAN. It protects against threats like denial of service attacks, toll fraud, and reconnaissance attacks by using features like intrusion prevention, rate limiting, and signature recognition. The SBC also enhances interoperability between different vendor systems and supports deployments in cloud environments.
The leading method of correspondence is clearly through voice trade. There are essentially two different ways through which voice can be effortlessly communicated on an organization: PSTN (Public Switched Telephone Network) and VoIP (Voice over Internet Protocol).
Mainly represented by SIP, VoIP protocols and implementations contain several vulnerabilities, particularly related to their complexities and in the face of interoperability of telephony equipment’s.
It was by identifying a lack of literature with focus in security and potential vulnerabilities of the SIP Protocol that we propose in this document. We attempt to provide a theoretical analysis from security aspects used by one of the signaling call protocols, Session Initiation Protocol (SIP).
It is intended to lucidly illustrate and identify threats, vulnerabilities, security mechanisms, developed methods and protocols and, finally over time improvements.
The document discusses how multi-service business gateways can secure enterprise VoIP networks by addressing various security threats. It outlines four categories of security threats to VoIP systems: network level threats, media threats, communication session threats, and application level threats. It then provides examples of network level threats like denial of service attacks and solutions like firewalls and VPNs. It also discusses securing RTP media by encrypting payloads and verifying integrity through hashing. Finally, it outlines how session border controllers within the business gateways can help secure communication sessions by preventing man-in-the-middle attacks and unauthorized session attempts through measures like encryption, access control lists, infrastructure hiding, and monitoring.
This document outlines 6 steps to secure SIP trunking and your network: 1) Update all software regularly to patch vulnerabilities, 2) Create complex, regularly changed passwords for all accounts, 3) Authenticate accounts based on IP address using whitelists and blacklists, 4) Only permit trusted SIP providers via firewall rules, 5) Understand how your provider handles signaling and media transmission and choose the most secure options, and 6) Establish secure connections like SSL for any remote access to your network. Taking these steps will reinforce network security and prevent fraudsters from accessing sensitive data and accounts.
An approach to mitigate DDoS attacks on SIP.pptxamalouwarda1
This document proposes an approach to mitigate distributed denial of service (DDoS) attacks on voice over internet protocol (VoIP) systems. It discusses common VoIP attacks like eavesdropping, reconnaissance, and DDoS attacks. The proposed system would use Suricata as an intrusion detection and prevention system to analyze VoIP traffic, detect attacks, and trigger mitigation responses. It recommends configuring call limits, updating device firmware, and using a buffer server to filter traffic as countermeasures against DDoS attacks on SIP-based VoIP networks.
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
The document discusses an enhanced IP traceback mechanism (EITM) to more efficiently trace the source of distributed denial of service (DDoS) attacks. EITM aims to reduce the number of packets required for traceback by improving existing linear and remainder packet marking schemes. It analyzes challenges in tracing attackers due to the stateless nature of the internet and proposes that an effective traceback scheme minimizes required packets. The main goal is a mechanism that needs a number of packets almost equal to the number of hops to reconstruct the attack path more efficiently.
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
This document discusses Voice over Internet Protocol (VoIP) including its protocols, security issues, benefits, and challenges. It begins by introducing VoIP and describing its basic operation and advantages like lower costs. It then covers specific VoIP protocols like SIP and H.323. The document analyzes VoIP considerations like delay, jitter, packet loss, and discusses how these issues can affect call quality. It also provides an overview of VoIP technologies and their benefits for businesses. Finally, it presents a case study on assessing network readiness for VoIP deployment.
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
Driven by the mobility, cloud computing, and Internet of Everything megatrends and fueled by increasingly sophisticated cybercriminals, today’s information landscape is more dynamic and more vulnerable than ever before.
Join Cisco and Lancope for a complimentary webinar to learn how you can implement a comprehensive, network-enabled approach to cybersecurity.
During the webinar we will discuss:
Using the Network as a Security Sensor with Lancope’s StealthWatch System and Flexible NetFlow and to obtain visibility at scale, monitor network activity efficiently, discover security incidents quickly, and help achieve compliance.
Using the Network as a Security Enforcer with Cisco TrustSec to ensure policy-based access control and network segmentation for containment of the network attacks, assist compliance and reduce risks of data-breaches.
The document discusses various categorizations and taxonomies for threats in VoIP systems. It summarizes an IETF draft from 2006 that categorized VoIP threats into interception, interruption of service, abuse of service, and social threats. The document then proposes narrowing VoIP threats into 5 categories: service disruption and annoyance, eavesdropping and traffic analysis, masquerading and impersonation, unauthorized access, and fraud. These categories provide a framework to classify current and new attacks against VoIP systems based on their goals and impact.
This document discusses network security and cryptography. It begins by describing modern organizational networks and their vulnerabilities. It then discusses physical networks, wired and wireless networks, and common network vulnerabilities and attacks. The document outlines goals of network security including confidentiality, integrity and availability. It describes security mechanisms at different networking layers and protocols for securing email communication, DNS, and web traffic. The key points are that network security aims to protect data in transit, vulnerabilities exist at various layers, and different security protocols operate at the application, transport and network layers to provide encryption, authentication and integrity for common network services.
This document discusses security issues and solutions related to Voice over IP (VoIP) systems. It begins with an introduction to VoIP and how it works, describing the protocols used including SIP, H.323, MGCP and RTP. It then outlines various security attacks on VoIP systems such as eavesdropping, denial of service attacks, and masquerading. Finally, it discusses approaches to enhancing VoIP security, including using encryption, firewalls, authentication, and secure protocols like SRTP.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
1. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
85
doi: 10.32622/ijrat.76S201919
Abstract—VoIP provides real-time voice
communications over packet-switched networks. VoIP is
widely used as it offers more flexibility when compared to
the traditional Public Switched Telephone Network (PSTN).
Session Initiation Protocol (SIP) is a protocol used for
initiating a session between the caller and the callee in the
VoIP system. SIP is a text-oriented protocol and is
implemented in a susceptible environment. These features
make SIP protocol vulnerable to various security risks such
as Denial of Service, Registration hijacking and
Eavesdropping. Detection of these attacks plays a vital role.
The Survey focuses on different techniques used for
detection of DoS attacks and differentiating between the
proposed mechanisms for identifying abnormalities and then
notifying the end-users about the possible intrusions.
IndexTerms— Attacks, Denial of Service, SIP,
Reliability, VoIP.
I. INTRODUCTION
Voice over IP (VoIP) is a technology which provides higher
flexibility and portability when compared to the
circuit-switched network. VoIP has a complex infrastructure
as it connects the conventional telephone network with Voice
over IP endpoints [1]. VoIP network comprises of various
components namely, gateway, server and end-user
equipment. Gateway is used for voice compression or
decompression, packetization and routing calls. The server is
used for performing network management functions. The
end-user equipment acts as a terminal for providing
connection to a network. VoIP uses two main protocols
namely, signaling protocol and media protocol. The
Signaling protocols are used to monitor call setup and
teardown. Examples of signaling protocols include SIP and
H.323. The Media protocols are used to monitor the
communication between different voice over IP networks. It
can be used for Real-time Transport Protocols (RTP).
VoIP has several disadvantages such as power outages,
issues in interoperability, complexity of service architecture
and security issues. The serious security problem faced by
VoIP networks is DoS attacks, which disrupts the availability
Manuscript revised May 13, 2019 and published on June 5, 2019
Namratha N, MTech CNE, Dept. of ISE, BMS College of Engineering,
Bangalore, India
Dr R Ashok Kumar, Associate Professor, Dept. of ISE, BMS College of
Engineering, Bangalore, India
of service to the customers. The call quality can be degraded
when VoIP services are made inaccessible or unusable [2].
SIP is a protocol used for initiating a session between the
caller and the callee in the VoIP network. It follows the
request/response model for call setup and call management.
SIP provides request and response messages which are used
to perform ordinary SIP operations. The SIP messages
illustrate the identity of the participants in a call and how the
participants communicate over an IP network..
II. LITERATURE REVIEW
Many kinds of research were made to deal with the
attacks against SIP-based Voice over IP networks. The
techniques were considered based on the nature of attack
namely DoS and VoIP flooding, which mainly targeted the
vulnerable communications. Senger et al. [3] used an online
statistical detection technique to deal with DoS attacks
known as VoIP Flooding Detection System(vFDS). vFDS is
a framework which employs Hellinger’s distance technique
to estimate the abnormal variations in collections of packet
streams as probability distributions. The scheme identifies
the DoS attacks quickly and precisely, but it is inefficacious
against low-level attacks as they exhibit the same probability
distributions as the regular traffic.
Ehlert et al. [4] proposed a double-layered
architecture to preclude and reduce Denial of Service attacks
in SIP-based Voice over IP networks. This technique uses a
bastion host along with traffic scanning module. The
proposed technique is effective when a minimal amount of
processing overhead is introduced. It becomes inefficient
when flooded packets use IP addresses which are spoofed
randomly.
Huici et al. [5] used a SIP Defender, a distributed
filtering mechanism, which uses the existing mechanisms
repeatedly. This mechanism has a complex architecture,
which can lead to difficult deployment issues. It can handle
large amounts of traffic when compared to other techniques.
Bansal and A R Pais [6] proposed a mitigation
mechanism to secure a Voice over IP server from a Denial of
Service attack. This technique includes an algorithm to
analyze SIP messages and calls and a teardown tool to
separate all SIP messages which are being occupied before
repelling the attack.
Zargar and Moghaddam. [7] proposed an entropy
mechanism to identify and avoid DoS attacks on SIP-based
Voice over IP networks. This system is used for examining
the VoIP network traffic behavior. It can be controlled by
increasing the size and the computation time. The system can
detect thechanges which occur in attacks by compressing the
datapresent in the SIP packet on a table.
Survey on Detection Techniques for Denial-of-Service
Attacks in SIP-based Voice over IP networks
Namratha N, Dr R Ashok Kumar
2. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
86
doi: 10.32622/ijrat.76S201919
Akbar and Farooq. [8] proposed a Packet-based SIP
IntrusionProtector (pbSIP) technique to detect Denial of
Service attackon SIP-based Voice over IP systems. pbSIP is a
techniqueused to identify malicious messages by analyzing
theincoming packets. This technique fails to detect attacks in
theevent of a malformed packet and good tracking of the
INVITEpackets in which entropy is not disturbed.
Cadet and Fokum. [9] proposed a mechanism to detect
andobstruct DoS attacks on a SIP server. This system
employsSnort, which is an Intrusion Prevention system used
to managenetwork traffic in real-time. Snort uses Rules to
protect theSIP server from the furtive activities.
III. SIP-BASED VOICE OVER IP NETWORKS OVERVIEW
Voice over IP protocol is used for transmission of
voicecommunication over the Internet. VoIP can be
implementedusing different transport and signaling protocols
such as SIPand H.323. Signaling protocols are employed to
allow callmanagement and to create connections between
endpoints.Session Initiation Protocol is a text-based protocol
which isused for Signaling, Call Setup and Call Management.
SIPresponse is generated for each request message sent to
specifythe status of the request [10]. The SIP
specificationrecommends the reusability of security
techniques such asHTTP digest, SIPS, Transport Layer
Security (TLS), as theprotocol is hard to secure.
The SIP protocol is susceptible to Denial-of-Service
attacksand Distributed Denial-of-Service attacks, in which
theattacker can overload a SIP server with many
malformedmessages. These vulnerabilities are due to the
inadequacy ofaccess to control policies.The SIP protocol
consists of four main entities:
• User-Agent: It includes IP, mobile phones andcomputers
that run on SIP-based software to initiateand terminate a SIP
request.
• Registrar Server: Database which maintainsinformation
about locations and user preferences asspecified by user
agents.
• Proxy Server: It is responsible for forwarding therequests
received by the caller to the callee.
• Redirect Server: It is a User Agent Server (UAS)which
allows the client to directly contact the server.
Request messages include INVITE, ACK, CANCEL,
BYE,REGISTER and OPTIONS. Fig 1 represents a SIP call
setupestablished between the caller and the callee. An
INVITErequest will be sent by the caller to the callee, which
containsinformation about the session he wants to begin. 100
Trying issent from the User Agent Server indicating that the
request hasbeen received by the UAS and is in progress.
Ringing statuscan be indicated using 180 Ringing response
messages. TheCaller receives 200 OK response messages if
the call isaccepted by the Callee. A call can be terminated by
Caller orCallee using the BYE message. This process
constitutes a 3-way handshake between Caller and Callee [1].
Figure 1 SIP Call Setup
Attacks encountered in SIP-based Voice over IP
Networks
VoIP networks are exposed to security threats, as they
use the public network as a way of communication [11]. The
attacks encountered in SIP-based Voice over IP networks
include [1]:
Registration Hijacking: The attacker may spoof an
Authentic User Agent to a registration server and
register it using a fake IP address. It contains several
steps such as traffic snipping, removing the message
and forwarding the manipulated message to the
server. Due to these steps of Registration Hijacking,
the attacker can reroute, answer or terminate the
call. Private information and calls can be lost when
the attacker uses Registration Hijacking.
Denial of Service attack: DoS attack is a type of
cyber-attack where the attackers tries to intercept
legitimate users from accessing the service. The
attacker sends an enormous number of INVITE
messages to worsen the SIP entities. The Flooding
attack mainly targets the proxy server, registrar
server and end users. It can be created by single or
multiple sources.
Spam over IP Telephony: SPIT produces a large
number of unwanted calls and messages using the IP
network to target a group of individuals and users. It
employs Zombies and Bots to attack a specific user.
Eavesdropping: It is an illegal interception of
personal communication between the Caller and the
3. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
87
doi: 10.32622/ijrat.76S201919
Callee. The network packets can be analyzed by the
attacker using Wireshark and Nmap
IV. COMPARISON OF DETECTIVE TECHNIQUES
Abhishek Bansal, Alwyn R. Pais [6] proposed a Mitigation
scheme based on SIP messages and call analysis. A
Legitimate user must send one or more INVITE messages to
establish a call. It is impossible for the user to make another
call without disconnecting the previous call. Attacker
forwards multiple INVITE messages without sending a BYE
message. An Attacker can be identified by counting the
number of INVITE and BYE messages received. Every SIP
message consists of “From” and “To” fields, which holds
details about the source and destination extensions, port
number and IP address. It is possible for the attacker to
manipulate the IP address of the phone. The mitigation
scheme consists of various analysis tools to detect the DoS
attacks.
Asterisk: The Asterisk tool is used as a SIP server to
combine any number of telephony hardware and
software with any telephonic application.
SIPp tool: This tool is used to impersonate
concurrent calls. It is mainly used to forward
multiple SIP messages to the Asterisk Server.
EKIGA Soft-phone: This tool is employed to test
whether a call can be made during a
Denial-of-Service attack. It is used as a video
conferencing application.
The Proposed Mitigation system fails to encode the SIP
messages. It is vulnerable to Phishing attack as it allows the
attackers to capture data from SIP messages.
Figure 2 System Flowchart
Carvajal et al. [12] proposed a system to identify unprotected
SIP-oriented Voice over IP traffic to warn the end-users
about the viable intrusions. The method consists of three
main processes namely, a collection of network traffic,
evaluating the packet headers and detecting whether the
SIP-oriented VoIP packets are protected or unprotected. The
Collection phase is used for encapsulating the traffic in the
network. The process used a Sniffer tool for capturing all the
traffic present in the network. The Analysis process is
responsible for examining the headers of the IP packet. It
checks the Protocol field of the IP header. If it contains the
value 17, the User Datagram Protocol will be deployed to
transmit messages. The SIP-based VoIP packets will be dealt
within the UDP packets. The UDP packet consists of
data-payload, which represents the actual data that must be
transmitted.The Detection process is responsible for
analyzing the payload of the UDP packets which holds the
port number 5060 to initiate a call. An alert will be sent to the
users if the conditions outlined in the detection process are
found. Fig 2 depicts the working of the program. This
technique is less effective as it considers only the 5061 port
for detection.
Golait and Hubbali [13] proposed an anomaly detection
system known as Voice over IP Flooding Detection
(VoIPFD). It consists of two states of operations namely, the
training state and the testing state. The Training state is
responsible for collecting and building normal behavior
profile of the VoIP SIP messages. Poisson distribution is used
for creating a profile of normal behavior for the VoIP system.
Poisson distribution describes the chances of occurrence of
several events in a given time interval, only when the value of
the average number of occurrences of the event is known in
advance [13].
Figure 3 VoIPFD Flowchart
4. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
88
doi: 10.32622/ijrat.76S201919
VoIPFD system specifies a threshold for identifying the
flooding attacks using the Poisson distribution. The Testing
phase is responsible for comparing the current SIP operation
profile with the previously built profile to detect DoS attacks.
The VoIPFD system employs Asterisk, VoIP Bots and
JavaScript for the detection process. It uses the default port of
5060 of Session Initiation Protocol for transferring the
network traffic using UDP. Fig 3 depicts the working of
VoIPFD system. The algorithm deployed by the system is
very complex and requires more than two parameters to be
modified every time to improve the reliability of the system.
Figure 4 Attack Detection Technique using Fuzzy
Systems
Mahsa Hosseinpour [14] proposed a technique for detecting
DoS attacks by using the SIP traffic modeling mechanism. It
constitutes 2 phases namely, the training phase and the
testing phase. The Training phase is used for creating Finite
State Machine (FSM) and deriving the required
specifications from the regular SIP messages. The Testing
phase employs fuzzy systems to detect the flooding attacks
and alert users about the intrusions. Parser module is used to
extract main parameters such as FROM, TO, CALL-ID from
each message of the existing sessions. The calls will be
contrasted with those observed in the created Finite State
Machine. The calls are made in different intervals of time,
due to which the extracted values in each time interval will be
compared with those collected from the training phase at the
same time interval. The system uses whitelisting mechanism
which provides special privilege to its users. The phone
numbers present in the whitelists will be accepted and
approved. The acquired values are sent to the fuzzy system to
diagnose the attack states (NORMAL, ALARM or
ATTACK) [14]. Fig 4 depicts the Attack Detection system
using Fuzzy systems. If the Fuzzy system is in the Attack
State, the users present in the whitelist can progress with their
calls and the other calls will not be allowed to reach the
server. If the Fuzzy system is in Alarm State, the users are
requested to answer a captcha, which can be completed by the
genuine user only. If the Fuzzy system is in Normal State, the
end-users can proceed with their calls without any
disruptions. The Fuzzy system is based on rules. Rules need
to be accurate for better detection of flooding attacks. A
change in the value of the Finite State Machine will affect the
other parameters present in the rules.
Rababe Safoine, Soufyane Mounir [1] proposed a
method to enhance the authenticity of the detecting
algorithm. The security methods are applied to both the ports
namely, 5060 (used for non-encrypted traffic) and 5061 (used
for encrypted traffic with Transport Layer Security). The
headers of the IP packets are examined, and the system
checks whether the User Datagram Protocol is used for
transmission of SIP messages between the VoIP endpoints.
5. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
89
doi: 10.32622/ijrat.76S201919
Figure 5 System flowchart for Attack Detection
Different security methods will be applied based on the
characteristics of each port. The system uses two different
security methods to provide enough security in both the
transmission ports. The port number 5061 is used to protect
the packets that pass through it based on the Transport Layer
Security protocol. Fig 5 represents the working of the
detection algorithm. Transport Layer Security (TLS) protocol
is a type of Cryptographic protocol that provides end-to-end
security over networks. It consists of two layers namely, the
TLS Record Protocol and the TLS Handshake protocol [15].
The TLS Record protocol is used for providing connection
security and the Handshake protocol is used for enabling the
client and server to authenticate each other and to confirm the
security keys before any data is transmitted. In the port 5060,
the system will generate a reference profile for an existing
SIP traffic. A threshold will be determined for every SIP
event based on the reference profile created. The behavior of
incoming packets will be compared with that of the reference
profile. If the packets are considered unprotected (or attacks),
an alarm will be triggered to alert the users about the possible
intrusions.
V. CONCLUSION
SIP-based VoIP networks have become more popular due
to its reliability. This communication has led to various
security threats such as flooding attacks, eavesdropping and
Denial of Service attacks. There are several detection
techniques proposed by several researchers to detect and
prevent DoS attacks. This survey presents a literature review
of SIP-based VoIP security techniques. Different algorithms
have been proposed for recognizing SIP-based Voice over IP
network DoS attacks. The Detection techniques used in the
survey focuses on detection of Denial-of Service attacks in
SIP-based Voice over IP networks and to alert the users about
the possible intrusions. The survey includes a comparative
study on different detection techniques used for detecting the
intrusions in SIP- oriented VoIP network.
REFERENCES
[1]. RababeSafoine and Abdelmajid Farchi, “Comparative study on
DOS attacks Detection Techniques in SIP-based VOIP networks”,
IEEE Transactions on, pp. 978-982, 2018.
[2]. A. Ghafarian and M. Dehghani, “An Empirical study of Security of
VoIP System” in SAI Computing Conference, pp. 1031-1036,
IEEE, 2016.
[3]. H. Sengar and D. Wijesekera, “Detecting VoIP Floods using the
Hellinger’s distance”, IEEE transactions on Parallel and distributed
systems, pp. 794-805, 2008.
[4]. S. Ehlert et al, “Two-layer Denial-of Service prevention on SIP
VoIP infrastructure”, Computer Communications, vol 31, pp.
2442-2456,2008.
[5]. F. Huici et al, “Protecting SIP against Very Large Flooding DoS
Attacks” in Global Telecommunications Conference, IEEE, pp.
1-6,2009.
[6]. A. Bansal and A R Pais, “Mitigation of Flooding-Based Denial of
Service Attack against Session Initiation Protocol based VoIP
System”, in International Conference for Computational
Intelligence Technology (CICT), IEEE, 2015, pp. 391-396.
[7]. R H M Zargar and M H Y Moghaddam, “An Entropy-based VoIP
Flooding Attacks Detection and prevention System”, in 4th
International Conf. on Computer and Knowledge Engineering
(ICCKE), pp. 691-696, IEEE,2014.
[8]. M A Akbar and M Farooq, “Securing SIP-based VoIP infrastructure
against flooding attacks and Spam over IP Telephony”, pp. 491-510,
2014.
[9]. F Cadet and D T Fokum, “Coping with DoS Attack on the IP
Telephony System”, in Southeast Conference, IEEE,2016.
[10]. R Preeti and R Baniwal, “Security issues in Voice over IP: A
Review”, in International Journal of Engineering and Computer
Science, vol. 3 Issue 2, pp. 3879-3883,2014.
[11]. V Srihari and R Anitha, “Security aspects of SIP-Based VoIP
networks: A Survey”, in Current Trends in Engineering and
Technology (ICCTET), pp. 143-150, 2014.
[12]. L Carvajal, L Chen and D Rawat, “Detecting Unprotected SIP-based
Voice over IP Traffic”, in 4th International Symposium on Digital
forensics and Security (ISDFS’16), pp. 44-48, IEEE, 2016.
[13]. D Golait and N Hubballi, “VoIPFD: Voice over IP Flooding
Detection” in 22nd National Conf. on Communication (NCC), pp.
1-6, IEEE,2016.
[14]. MahsaHosseinpour, YaghmaeeMoghaddam and Seved Amin
Hosseini Seno, “Modeling SIP Normal Traffic to Detect and Prevent
SIP-VoIP Flooding attacks using Fuzzy Logic”, in 6th Int. Conf. on
Computer and Knowledge Engineering (ICCKE’17), 2017.
[15]. D Ozden, “Analysis of Recent Attacks on SSL/TLS Protocols”,2016