Abstract
Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approaches to detect DoS and DDoS attacks, and classify them based on various factors. We then analyze these approaches according to various characteristics; furthermore, we investigate the main strengths and weaknesses of these approaches. Finally, we provide some remarks for enhancing the surveyed approaches and highlight directions for future research to build effective detection solutions.
Highlights
Voice over IP (VoIP) is the technology used for transferring voice and multimedia data overInternet Protocol (IP) networks
VoIP systems are taking over traditional solutions worldwide because of their low cost and high quality of service for voice and multimedia communications
The rapid growth of VoIP makes it an attractive target for attackers, which in turn may cause a reduction in quality of service (QoS) [2]
Summary
Voice over IP (VoIP) is the technology used for transferring voice and multimedia data over. End-user equipment is used to access the VoIP system and communicates with other endpoints It initiates and maintains the necessary signaling process to establish calls over the network. VoIP systems use data transfer protocols such as the Real-Time Transport Protocol (RTP) [4] to transfer voice and multimedia data over packet-switched IP networks. They use signaling protocols such as H.323 or the Session Initiation Protocol (SIP) [5] to manage communication sessions. As a matter of fact, the survey presented in this paper introduces an up-to-date survey of DoS and DDoS attacks detection approaches over VoIP networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.