International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 3, Issue 9  (September 2016), Pages:  90-96


Title: DDoS attacks in VoIP: a brief review of detection and mitigation techniques

Author(s):  Sambath Narayanan *, Selvakumar Manickam, Yu-Beng Leau

Affiliation(s):

National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia (USM), Penang, Malaysia

https://doi.org/10.21833/ijaas.2016.09.013

Full Text - PDF          XML

Abstract:

Voice communication in recent trends has shown rapid growth in homes and businesses with the development of Voice over Internet Protocol (VoIP). The growth in VoIP subscribers was determined by the increase in VoIP flexibility, Quality of Service and monetary savings. The fall in public switched telephone network and raise in phone portability migrated PSTN to VoIP. The Session initiation protocol being an application layer protocol helps to create session between the caller and the called for bidirectional communication using SIP messages. The VoIP became targeted victim of different attacks as internet became the medium of transmission. The security vulnerabilities arise from new protocols and the existing infrastructure of traditional data network. Flood-based attacks are more threatening and annoying than other attacks. This brief review paper discusses on different types of VoIP attacks along with the existing VoIP detection and mitigation techniques based on Entropy, Wavelet, Sketch and Hellinger distance, Sunshine and RQA are presented. 

© 2016 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: VoIP, SIP, DDoS, Security

Article History: Received 20 July 2016, Received in revised form 28 August 2016, Accepted 25 September 2016

Digital Object Identifier: https://doi.org/10.21833/ijaas.2016.09.013

Citation:

Narayanan S, Manickam S, and Leau YB (2016). DDoS attacks in VoIP: a brief review of detection and mitigation techniques. International Journal of Advanced and Applied Sciences, 3(9): 90-96

http://www.science-gate.com/IJAAS/V3I9/Narayanan.html


References:

Butcher D, Li X and Guo J (2007). Security challenge and defense in VoIP infrastructures. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6): 1152-1162.
http://dx.doi.org/10.1109/TSMCC.2007.905853

Cha EC, Choi HK and Cho SJ (2007). Evaluation of security protocols for the session initiation protocol. The 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007): 611-616.

https://doi.org/ 10.1109 /ICCCN.2007.4317885

Ekekwe N and Maduka A (2007). Security and risk challenges of voice over IP telephony. The IEEE International Symposium on Technology and Society (ISTAS 2007): 1-3. 
http://dx.doi.org/10.1109/ISTAS.2007.4362213
Hallock J (2004). A brief history of VoIP. Evolution and Trends in Digital Media Technologies - COM 538. Masters of Communication in Digital Media - University of Washington, http:// www.joehallock.com/edu/pdfs/Hallock_J_VoIP_Past.pdf.
Heckstall V (2016). 5 Reasons VoIP is Essential for Business Today. Retrieved 2 May, 2016, Available online at: http://tech.co/voip-essential-business-today-2015-03
Hoffstadt D, Rathgeb E, Liebig M, Meister R, Rebahi Y and Thanh TQ (2014). A comprehensive framework for detecting and preventing VoIP fraud and misuse. The IEEE International Conference on Computing, Networking and Communications (ICNC): 807-813. 
http://dx.doi.org/10.1109/iccnc.2014.6785441
IBIS (2015). VoIP in the US: Market Research Report. Retrieved 3 May, 2015, Available online at: http://www.ibisworld.com/industry/default.aspx?indid=1269
Jeyanthi N, Thandeeswaran R and Vinithra J (2014). Rqa based approach to detect and prevent ddos attacks in voip networks. Cybernetics and Information Technologies, 14(1): 11-24.
http://dx.doi.org/10.2478/cait-2014-0002
Li M and Li M (2009). A new approach for detecting DDoS attacks based on wavelet analysis. 2nd IEEE International Congress on Image and Signal Processing (CISP '09): 1-5. 
http://dx.doi.org/10.1109/cisp.2009.5300903
Sisalem D, Kuthan J and Ehlert S (2006). Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. IEEE Network, 20(5): 26-31.
http://dx.doi.org/10.1109/MNET.2006.1705880
Sonkar SK, Singh R, Chauhan R and Singh AP (2012). A Review Paper: Security on Voice over Internet Protocol from Spoofing attacks. International Journal of Advanced Research in Computer and Communication Engineering, 1(3): 153-160.

Tang J, Cheng Y and Hao Y (2012, March). Detection and prevention of SIP flooding attacks in voice over IP networks. The 2012 IEEE Proceedings In INFOCOM: 1161-1169.

https://doi.org/10.1109 /INFCOM.2012.6195475

Topic P (2013). VoIP Statistics - Market Analysis (Q1 2013). Point Topic Ltd, London, UK.
Tritilanunt S, Sivakorn S, Juengjincharoen C and Siripornpisan A (2010). Entropy-based input-output traffic mode detection scheme for DOS/DDOS attacks. The 2010 IEEE International Symposium on Communications and Information Technologies (ISCIT): 804-809. 
http://dx.doi.org/10.1109/iscit.2010.5665097
Wansink K (2016). BuddeComm Intelligence Report - VoIP and Mobile VoIP Statistics and Insights. Retrieved 29 April, 2016, Available online at: http://www.budde.com.au/Research/BuddeComm-Intelligence-Report-VoIP-and-Mobile-VoIP-Statistics-and-Insights.html
Zhao H and Ansari N (2012). Detecting covert channels within VoIP. The 35th IEEE Sarnoff Symposium (SARNOFF): 1-6. https://doi.org/ 10.1109/SARNOF.2012.6222709
http://dx.doi.org/10.1109/sarnof.2012.6222709