Earticle

현재 위치 Home

Trust Based Approach to Detect and Prevent Distributed Denial of Service Attacks and Flash Crowds in VoIP Services

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJSIA) 바로가기
  • 간행물
    International Journal of Security and Its Applications SCOPUS 바로가기
  • 통권
    Vol.5 No.3 (2011.07)바로가기
  • 페이지
    pp.59-74
  • 저자
    N. Jeyanthi, N.Ch.S. N..Iyengar
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A153623

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Voice-over-IP (VoIP) is being widely used to packetize and relay voice information over existing IP networks. Due to the cheaper costs involved in using VoIP as opposed to traditional PSTN networks it is quickly gaining momentum and has seen widespread use in both personal and business domains. If this technology is to grow and gain over normal phone calls it must fulfill certain conditions that Public Switched Telephone Networks (PSTN) currently provide. Since VoIP uses the same routes used by normal Internet traffic, it is prone to a wide range of security threats, similar to those faced by normal packet data. These include, but are not limited to, Denial of Service (DoS), intruders in the network who either eavesdrop or are able to make free calls, man-in-the-middle attacks, etc. It thus becomes imperative that a protocol be developed that is able to both guard against and take corrective action in the event of the occurrence of any attack. In this paper we propose a protocol that detects and prevents the occurrence of a distributed Denial of Service (DDoS) attack. It also enforces security mechanisms to ensure that an attacker has not gained access to a user's password and thus making illegitimate calls. We develop a trust mechanism that can be used to detect an attacker in the network. The protocol has been rigorously examined through a wide range of experiments and the results have been found to be quite promising.

목차

Abstract
 1. Introduction
  1.1 Denial of Service
  1.2 Flash Crowds
  1.3 Related Work
 2. The System Model
  2.1 The Network Model
  2.2 Preventing an Attack
  2.3 Detecting an Attacker
 3. Frame Formats
  3.1 The Alert Packet
  3.2 The User Information Packet
 4. Experimental Evaluation
  4.1 Varying the Network Size
  4.2 Effect of Attack Interval on the Occurrence of an Attack
  4.3 Quality of Service – Packet Loss against Network Size
 5. Conclusions
 References

키워드

Voice over Internet Protocol Denial of Service Routing Attack Detection Attack Prevention Trust.

저자

  • N. Jeyanthi [ School of Information Technology and Engineering, VIT University, Vellore - 632014, Tamilnadu, India ]
  • N.Ch.S. N..Iyengar [ School of Computing Science and Engineering, VIT University, Vellore - 632014, Tamilnadu, India ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Security and Its Applications
  • 간기
    격월간
  • pISSN
    1738-9976
  • 수록기간
    2008~2016
  • 등재여부
    SCOPUS
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Security and Its Applications Vol.5 No.3

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장