Open Access

Rqa based approach to detect and prevent ddos attacks in voip networks


Cite

1. Goode, B. Voice Over Internet Protocol (Vo IP). - Proceedings of IEEE, Vol. 90, 2002, No 9, 1495-1517. 2. Rosenberg, J., H. Schulzrinne, G. Camarillo. SIP: Session Initiation Protocol. - IETF RFC 3261, 2002. 3. Le i-Jun, L. A New Type of DDo S Defense System Study. - IEEE, 2010, 307-309. 4. Sisalem, D., J. Kuthan, S. Ehlert. Denial of Service Attacks Targetinga SIP Vo IP Infrastructure - Attack Scenarios and Prevention Mechanisms. - IEEE Network, Vol. 20, 2006, No 5, Special Issue on Securing Vo IP, 26-31. 5. Jin, Shuyua n, D. S. Yeung. A Covariance Analysis Model for DDo S Attack Detection. - IEEE Communications Society, April 2004, 1822-1886. 6. Tritilanunt, S., S. Sivakorn, C. Juengjincharoe n, A. Siripornpisa n. Entropy- Based Input-Output Traffic Mode Detection Scheme for Do S/DDo S Attacks. - IEEE Communication Society, 2010, 804-809. 7. Lee, Je Ha k, Dong Seong Kim, Sang Min Lee, Jong Sou Park. DDoS Attacks Detection Using GAbased Optimized Traffic Matrix. - In: Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011, 216-220. 8. Leu, Fang-Yi e, Chia-Chi Pa i. Detecting Do Sand DDo S Attacks using Chi-Square. - In: 5th International Conference on Information Assurance and Security, IEEE Computer Society, 2009, 255-258. 9. Nashat, D., X. Jiang, S. Horiguchi. Router Based Detection for Low-Rate Agents of DDoS Attack. - In: IEEE International Conference on High Performance Routing and Switching, 2008, 177-182. 10. Kumar, K., R. C. Joshil, Kuldip Sing h. A Distributed Approach using Entropy to Detect DDo S Attacks in ISP Domain. - In: IEEE - International Conference on Signal Processing Communications and Networking, February 2007, 331-337. 11. Lam, Ho-Yu, Chi-Pan Li, S. T. Chanso n, Di t-Yan Yeung. A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks. - IEEE Communications Society, 2006, 2165-2170. 12. Liu, Haiqin, Yan Sun, Min Sik Kim. Fine-Grained DDo S Detection Scheme Based on Bidirectional Count Sketch. - In: IEEE International Conference on Computer Communications and Networks, 2011, 1-6. 13. Chen, Chin-Ling. Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test. - In: IEEE Third International Conference on Communications and Networking in China, 2008. China Com 2008, 1253-1257. 14. Li, Muhai, Ming Li. A New Approach for Detecting DDo S Attacks Based on Wavelet Analysis. - In: IEEE 2nd International Congress on Image and Signal Processing, 2009, 1-5. 15. Yu, Wei, Dong Xuan, Wei Zhao. Middleware-Based Approach for Preventing Distributed Deny of Service Attacks. - In: IEEE MILCOM Proceedings, 2002, 1124-1129. 16. Nagaratna, M., V. Kamakshi Prasad, S. Tanuz Kumar. Detecting and Preventing IP-Spoofed DDo S Attacks by Encrypted Marking Based Detection And Filtering (EMDAF). - In: International Conference on Advances in Recent Technologies in Communication and Computing, IEEE 2009, 753-755. 17. Jeyanthi, N., J. Vinithra, S. Sneha, R. Thandeeswara n, N. Ch. S. N. Iyenga r. A Recurrence Quantification Analytical Approach to Detect DDoS Attacks. - In: IEEE International Conference on Computational Intelligence and Communication Networks, 2011, 58-62. 18. Choi, Yang-Se o, Jin-Tae Oh, Jong-Soo Jang, Ja e-Cheol Ryou. Integrated DDo S Attack Defense Infrastructure for Effective Attack Prevention. - IEEE Information Technology Convergence and Services, 2010, 1-6. 19. Tariqal, U., Y. Malikb, B. Abdulrazak b, M. Hong c. Collaborative Peer to Peer Defense Mechanism for DDo S Attacks. - In: 2nd International Conference on Ambient Systems, Networks and Technologies (ANT), 2011, 157-164 20. Siris, V. A., I. Stavraki s. Provider-Based Deterministic Packet Marking Against DDo S Attacks. - Journal of Network and Computer Applications, Vol. 30, 2007, No 3, 858-876. 21. Park, K., H. Lee. The Effectiveness of Route-Based Packet Filtering for Distributed Denial of Attack Prevention in Power Law Internets. - In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, 2001, 15-26. 22. Douligeris, C., A. Mitrokotsa. DDo S Attacks and Defense Mechanisms: Classification and State-of-the-Art. - Computer Networks, Vol. 44, 2004, No 5, 643-666. 23. Du, Ping, Akihiro Nakao. Over Court: DDoS Mitigation Through Credit-Based Traffic Segregation and Pathmigration. - IEEE Computer Communications, Vol. 33, 2010, 2164-2175. 24. Peng, T., C. Leckie, K. Ramamohanara o. Protection from Distributed Denial of Service Using History-Based IP Filtering. - IEEE, Vol. 1, 2003, 482-486. 25. Xiang, Yang, Wanlei Zhou. A Defense System Against DDo S Attacks by Large-Scale IP Traceback. - In: Third International Conference on Information Technology and Applications, IEEE Computer Society, 2005, 431-436. 26. Chao-Yang, Zhan g. DOS Attack Analysis and Study of New Measures to Prevent. - In: International Conference on Intelligence Science and Information Engineering, IEEE, 2011, 426-429. 27. www.xmco.fr/whitepapers/voip-security-layered-approach.pdf 28. Jeyanthi, N., N. Ch. S. N. Iyenga r. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDo S Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, 46-60. 29. Palmieri, F., U. Fiore. Network Anomaly Detection through Nonlinear Analysis. - Computers & Security, Science Direct, Vol. 29, 2010, No 7, 737-755. 30. Recurrance Plots. http://www.recurrence-plot.tk/glance.phpSearch in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology