Abstract

Voice over IP (VoIP) services hold promise because of their offered features and low cost. Most VoIP networks depend on the Session Initiation Protocol (SIP) to handle signaling functions. The SIP is a text-based protocol that is vulnerable to many attacks. Denial of Service (DoS) and distributed denial of service (DDoS) attacks are the most harmful types of attacks, because they drain VoIP resources and render SIP service unavailable to legitimate users. In this paper, we present recently introduced approaches to detect DoS and DDoS attacks, and classify them based on various factors. We then analyze these approaches according to various characteristics; furthermore, we investigate the main strengths and weaknesses of these approaches. Finally, we provide some remarks for enhancing the surveyed approaches and highlight directions for future research to build effective detection solutions.

Highlights

  • Voice over IP (VoIP) is the technology used for transferring voice and multimedia data overInternet Protocol (IP) networks

  • VoIP systems are taking over traditional solutions worldwide because of their low cost and high quality of service for voice and multimedia communications

  • The rapid growth of VoIP makes it an attractive target for attackers, which in turn may cause a reduction in quality of service (QoS) [2]

Read more

Summary

Introduction

Voice over IP (VoIP) is the technology used for transferring voice and multimedia data over. End-user equipment is used to access the VoIP system and communicates with other endpoints It initiates and maintains the necessary signaling process to establish calls over the network. VoIP systems use data transfer protocols such as the Real-Time Transport Protocol (RTP) [4] to transfer voice and multimedia data over packet-switched IP networks. They use signaling protocols such as H.323 or the Session Initiation Protocol (SIP) [5] to manage communication sessions. As a matter of fact, the survey presented in this paper introduces an up-to-date survey of DoS and DDoS attacks detection approaches over VoIP networks.

Related Work
SIP Overview
Architecture
Call Establishment
Messages
Requests
Responses
Denial of Service Attacks
Flooding Attacks
Malformed Message Attacks
Distributed Denial of Service Attacks
Recent Approaches
Finite State Machine Approaches
Rules Based Approaches
Statistically Based Approaches
Machine Learning Approaches
Analysis of Surveyed Approaches
Different Classifiers and Flooding
Challenges and Future Directions
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.