Voice over Internet Protocol (VoIP) is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol (SIP) is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it.
Distributed Denial of Service Attack (DDoS) floods the server with numerous requests from various hosts. Hence, the legitimate clients will not be able to get their intended services. A major concern in VoIP and almost in all network domains is availability rather than data consistency. Most of the surviving techniques could prevent VoIP network only after collision. This paper proposes a Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack. This model detects the attack at an earlier stage and also helps to prevent from further attacks. In addition, this techniques enables the efficient utilization of resources. QUALNET has been used to simulate the operation of the proposed technology.
-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. - In: NSDI ’05: 2nd Symposium on Networked Systems Design & Implementation, 2005, 287-300.
12. Wang, K., C-Y Huang, S-J Lin, Y-D Lin. A Fuzzy Pattern-Based Filtering Algorithm for Botnet Detection, Computer Networks. - The International Journal of Computer and Telecommunications Networking, Vol. 55 , 2011, 3275-3286.
13. Tripathi, A., A. Mishra. Cloud Computing Security Considerations, IT Division. DOEACC Society, Gorakhpur Centre, Gorakhpur, India, 2010, IEEE
Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea and Mehedi Masud
. Berger. Botz-4-Sale: Surviving Organized DDo S Attacks that Mimic Flash Crowds. - In: Proc. of 2nd Symp. Networked Syst. Des. Implement, 2005, pp. 287-300. http://dl.acm.org/citation.cfm?id=1251224
21. Kaur, K., S. Vashisht. Data Separation Issues in Cloud Computing. - Int. J. Adv. Res. Eng. Technol., Vol. 1, 2013, No X, pp. 26-29.
22. Keromytis, A., V. Misra, D. Rubenstein. SOS: Secure Overlay Services. - In: Proc. of SIGCOMM, ACM, 2002, pp. 61-72.
23. Khan, A., N. Fisal, S. Hussai n. Man-in-the-Middle Attack and
. Sudargho. Survivable Network Design under Optimal and Heuristic Interdiction Scenarios. – Journal of Global Optimization, Vol. 38 , June 2007, No 2, pp. 181-199.
62. Akgun, L., B. C. Tansel, R. K. Wood. The Multi-Terminal Maximum-Flow Network-Interdiction Problem. – European Journal of Operational Research, Vol. 211 , June 2011, No 2, pp. 241-251.
63. Marquez, J. E. R., C. M. Rocco, G. Levitin. Optimal Network Protection against Diverse Interdictor Strategies. – Reliability Engineering & System Safety, Vol. 96 , March 2011, No 3, pp. 374-382.
The effective management approach: integration of business, quality management and knowledge management processes
In the nowadays' dynamic environment only those organizations can survive that are able quickly react to opportunities and threats from the environment and to produce innovation ideas and turn them into products and services at a quicker pace then the competition. Therefore organizations seek different ways how to get ahead competitors. As quality management and knowledge management have proved themselves as perspective fields author of the paper proposes the integrated approach of both areas in order organizations can gain the most possible benefit from applying them. This paper shows the deeper aspects of both of these fields from the point of view of the process approach. Here is discussed the interactions of quality management, knowledge management and business processes. An elaborated organizational business and quality management process chart shows how quality management processes support the organization's management by providing information about system effectiveness, process performance, customer satisfaction and requirements. This information can be successfully used as a basis for decision-making concerning the necessary improvements and organization future goals. An integrated organizational business, quality management and knowledge management process chart demonstrates how effective management of an organization's knowledge assets can help to improve the organization's tasks in the sense of organizational performance, effectiveness and innovations. This paper is a beginning of the research toward the development of knowledge management services for quality management.
M. Wu, Multimedia Data Hiding. Princeton: Princeton University, Department of Electrical Engineering, 2001.
B. Basile, K. Threlkeld, D. Valvano, Surviving Attacks on Information Hiding and Audio Watermarking , December 2008. [Online]. Available: http://cnx.org/content/m19003/1.1
Don H. Johnson, Signal-to-noise ratio. Scholarpedia, 2006. [Online]. Available: http://www.scholarpedia.org/article/Signal-to-noise_ratio [Accessed: Sept. 30, 2010]. http
Tor-powered Decentralized DNS for Tor Onion Services
Jesse Victors, Ming Li and Xinwen Fu
] Michael T Goodrich, Roberto Tamassia, and Andrew Schwerin, Implementation of an authenticated dictionary with skip lists and commutative hashing, DARPA Information Survivability Conference & Exposition II, 2001. DISCEX’01. Proceedings, vol. 2, IEEE, 2001, pp. 68-82.
 David Goulet and George Kadianakis, Random number generation during tor voting, https://gitweb.torproject.org/torspec.git/tree/proposals/250-commit-reveal-consensus.txt, 2015.
 katmagic, Shallot, https://github.com/katmagic/Shallot, 2012.
and defenses. In Proceedings of ESORICS 2006 , September 2006.
 P. Syverson, M. Reed, and D. Goldschlag. Onion Routing access configurations. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX 2000) , volume 1, pages 34–40. IEEE CS Press, 2000.
 P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability , pages 96–114. Springer
: The Dominant Dozen. Information Systems Management , 2006, vol. 23, N 4. p. 31-36.
Gibbert, M., Ruigrok, W. and Wicki, B. What Passes as a Rigorous Case Study. Strategic Management Journal , 2008, vol. 29, N 13. p. 1465-1474.
ISO/IEC 12207. ISO/IEC 12207:2008: Systems and Software Engineering — Software Life Cycle Processes. Geneva, Switzerland : ISO/IEC, 2008.
Cusumano, M. A. The Business of Software: What Every Manager, Programmer, and Entrepreneur must Know to Thrive and Survive in