A SIP-TRW algorithm for DDoS attack detection in SIP environments
Abstract
References
Index Terms
- A SIP-TRW algorithm for DDoS attack detection in SIP environments
Recommendations
DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics
TRUSTCOM '13: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsDDoS attacks are one of the major threats to Internet services. Sophisticated hackers are mimicking the features of legitimate network events, such as flash crowds, to fly under the radar. This poses great challenges to detect DDoS attacks. In this paper,...
Smart and Lightweight DDoS Detection Using NFV
ICCDA '17: Proceedings of the International Conference on Compute and Data AnalysisThe Distributed Denial of Service (DDoS) attack is a major threat to the network infrastructure. Network providers suffer from various types of DDoS attacks; the attack uses different advanced techniques such as botnets and tools to launch the attacks. ...
An Analysis of Security Implications in Session Initiation Protocol (SIP)
AMS '13: Proceedings of the 2013 7th Asia Modelling SymposiumVoice over IP (VoIP) has become an indispensible part of our life as individuals, organizations, and corporate move from traditional Plain Old Telephony Systems (POTS) to VoIP based systems. This allows the cost to make or receive calls come down ...
Comments
Information & Contributors
Information
Published In
- Conference Chairs:
- Kwan-Ho You,
- Sang-Won Lee,
- General Chairs:
- Won Kim,
- Dongho Won
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 153Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in