DocumentCode :
2056936
Title :
A restrictive model (RM) for detection and prevention of INVITE flooding attack
Author :
Raza, Muhammad Ahmad ; Khan, Ajmal ; Raza, M.
fYear :
2013
fDate :
25-26 Sept. 2013
Firstpage :
1
Lastpage :
6
Abstract :
The denial of service (DOS) attack is a known problem in computer networks. This paper reviews DOS attack at the Application layer using session initiation protocol (SIP). Most of the existing solutions are based on adaptive threshold, cumulative sum, and Hellinger distance (HD). The HD uses number of INVITE messages for prediction of the possible flooding attack. A limitation of these approaches is that they all need training phase before actually being tested in the real situation. The proposed method proposes a completely different solution where transport layer protocol based on UDP is used to block the stream of undesired packets. This approach is novel and found to be working in various situations. The algorithm is rigorously tested using the network simulator NS2.
Keywords :
computer network security; signalling protocols; transport protocols; DOS attack; HD; Hellinger distance; INVITE flooding attack; NS2 network simulator; RM; SIP; UDP protocol; adaptive threshold; application layer; cumulative sum; denial of service attack; restrictive model; session initiation protocol; transport layer protocol; Availability; Buffer storage; Computer crime; Floods; IP networks; Protocols; Servers; IP multimedia subsystem (IMS); Key Words: Session initiation protocol (SIP); denial of service (DOS) attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer,Control & Communication (IC4), 2013 3rd International Conference on
Conference_Location :
Karachi
Print_ISBN :
978-1-4673-6011-1
Type :
conf
DOI :
10.1109/IC4.2013.6653766
Filename :
6653766
Link To Document :
بازگشت