VoIP Denial of Service Attacks Classification and Implementation

被引:0
|
作者
Al-Allouni, Housam [1 ]
Rohiem, Alaa Eldin [1 ]
Ahmed, Mohammed Hashem Abd El-Aziz
El-moghazy, Ali [1 ,2 ]
机构
[1] Mil Tech Coll, Cairo, Egypt
[2] Ain Shams Univ, Cairo, Egypt
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Voice over Internet Protocol (VoIP) is the newest and the fastest growing technology which consists of routing voice conversations over IP-based network. The flexibility of the VoIP system and the convergence of voice and data networks brings with it additional security requirements, VoIP availability is the most important one. Denial-of-service (DoS) attacks are the main concerns with regard to causing loss of VoIP availability. Its impact ranges from mild service degradation to complete loss of service. In order to avoid this type of attack and discover its security vulnerabilities, it is important to be aware of attack's mechanisms and have a good understanding of their impacts. The main contribution of this paper is to present VoIP DoS attacks' classes, identify common ones in each class, and to implement a test bed to generate, analyze and measure the impact of VoIP flooding attacks.
引用
收藏
页码:434 / 445
页数:12
相关论文
共 50 条
  • [41] Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems
    Kafke, John
    Viana, Thiago
    NETWORK, 2022, 2 (04): : 545 - 567
  • [42] DT-Model: a classification model for distributed denial of service attacks and flash events
    Tinubu C.O.
    Sodiya A.S.
    Ojesanmi O.A.
    Adeleke E.O.
    Adebowale A.O.
    International Journal of Information Technology, 2022, 14 (6) : 3077 - 3087
  • [43] Distributed Denial of Service Attacks in Cloud Computing
    Abusaimeh, Hesham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 163 - 168
  • [44] Denial of service via algorithmic complexity attacks
    Crosby, SA
    Wallach, DS
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 29 - 44
  • [45] Mitigating denial of service attacks with password puzzles
    Ma, M
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 621 - 626
  • [46] On Denial of Service Attacks in Software Defined Networks
    Zhang, Peng
    Wang, Huanzhao
    Hu, Chengchen
    Lin, Chuang
    IEEE NETWORK, 2016, 30 (06): : 28 - 33
  • [47] Scheme to Prevent Denial of Service Attacks on UPnP
    Wang, Jiahui
    He, Liang
    Zhou, Zili
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 430 - 433
  • [48] Investigation of Simple Denial-of-Service Attacks
    Voitovych, Olesya
    Baryshev, Yurii
    Kolibabchuk, Eduard
    Kupershtein, Leonid
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 145 - 148
  • [49] Distributed Denial of Service Attacks: A Threat or Challenge
    Kaur Chahal J.
    Bhandari A.
    Behal S.
    New Review of Information Networking, 2019, 24 (01) : 31 - 103
  • [50] Bandwidth Distributed Denial of Service: Attacks and Defenses
    Geva, Moti
    Herzberg, Amir
    Gev, Yehoshua
    IEEE SECURITY & PRIVACY, 2014, 12 (01) : 54 - 61