Have a personal or library account? Click to login
Rqa based approach to detect and prevent ddos attacks in voip networks Cover

Rqa based approach to detect and prevent ddos attacks in voip networks

Open Access
|Apr 2014

References

  1. 1. Goode, B. Voice Over Internet Protocol (Vo IP). - Proceedings of IEEE, Vol. 90, 2002, No 9, 1495-1517. 2. Rosenberg, J., H. Schulzrinne, G. Camarillo. SIP: Session Initiation Protocol. - IETF RFC 3261, 2002. 3. Le i-Jun, L. A New Type of DDo S Defense System Study. - IEEE, 2010, 307-309. 4. Sisalem, D., J. Kuthan, S. Ehlert. Denial of Service Attacks Targetinga SIP Vo IP Infrastructure - Attack Scenarios and Prevention Mechanisms. - IEEE Network, Vol. 20, 2006, No 5, Special Issue on Securing Vo IP, 26-31. 5. Jin, Shuyua n, D. S. Yeung. A Covariance Analysis Model for DDo S Attack Detection. - IEEE Communications Society, April 2004, 1822-1886. 6. Tritilanunt, S., S. Sivakorn, C. Juengjincharoe n, A. Siripornpisa n. Entropy- Based Input-Output Traffic Mode Detection Scheme for Do S/DDo S Attacks. - IEEE Communication Society, 2010, 804-809. 7. Lee, Je Ha k, Dong Seong Kim, Sang Min Lee, Jong Sou Park. DDoS Attacks Detection Using GAbased Optimized Traffic Matrix. - In: Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011, 216-220. 8. Leu, Fang-Yi e, Chia-Chi Pa i. Detecting Do Sand DDo S Attacks using Chi-Square. - In: 5th International Conference on Information Assurance and Security, IEEE Computer Society, 2009, 255-258. 9. Nashat, D., X. Jiang, S. Horiguchi. Router Based Detection for Low-Rate Agents of DDoS Attack. - In: IEEE International Conference on High Performance Routing and Switching, 2008, 177-182. 10. Kumar, K., R. C. Joshil, Kuldip Sing h. A Distributed Approach using Entropy to Detect DDo S Attacks in ISP Domain. - In: IEEE - International Conference on Signal Processing Communications and Networking, February 2007, 331-337. 11. Lam, Ho-Yu, Chi-Pan Li, S. T. Chanso n, Di t-Yan Yeung. A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks. - IEEE Communications Society, 2006, 2165-2170. 12. Liu, Haiqin, Yan Sun, Min Sik Kim. Fine-Grained DDo S Detection Scheme Based on Bidirectional Count Sketch. - In: IEEE International Conference on Computer Communications and Networks, 2011, 1-6. 13. Chen, Chin-Ling. Detecting Distributed Denial-of-Service Attack Traffic by Statistical Test. - In: IEEE Third International Conference on Communications and Networking in China, 2008. China Com 2008, 1253-1257. 14. Li, Muhai, Ming Li. A New Approach for Detecting DDo S Attacks Based on Wavelet Analysis. - In: IEEE 2nd International Congress on Image and Signal Processing, 2009, 1-5. 15. Yu, Wei, Dong Xuan, Wei Zhao. Middleware-Based Approach for Preventing Distributed Deny of Service Attacks. - In: IEEE MILCOM Proceedings, 2002, 1124-1129. 16. Nagaratna, M., V. Kamakshi Prasad, S. Tanuz Kumar. Detecting and Preventing IP-Spoofed DDo S Attacks by Encrypted Marking Based Detection And Filtering (EMDAF). - In: International Conference on Advances in Recent Technologies in Communication and Computing, IEEE 2009, 753-755. 17. Jeyanthi, N., J. Vinithra, S. Sneha, R. Thandeeswara n, N. Ch. S. N. Iyenga r. A Recurrence Quantification Analytical Approach to Detect DDoS Attacks. - In: IEEE International Conference on Computational Intelligence and Communication Networks, 2011, 58-62. 18. Choi, Yang-Se o, Jin-Tae Oh, Jong-Soo Jang, Ja e-Cheol Ryou. Integrated DDo S Attack Defense Infrastructure for Effective Attack Prevention. - IEEE Information Technology Convergence and Services, 2010, 1-6. 19. Tariqal, U., Y. Malikb, B. Abdulrazak b, M. Hong c. Collaborative Peer to Peer Defense Mechanism for DDo S Attacks. - In: 2nd International Conference on Ambient Systems, Networks and Technologies (ANT), 2011, 157-164 20. Siris, V. A., I. Stavraki s. Provider-Based Deterministic Packet Marking Against DDo S Attacks. - Journal of Network and Computer Applications, Vol. 30, 2007, No 3, 858-876. 21. Park, K., H. Lee. The Effectiveness of Route-Based Packet Filtering for Distributed Denial of Attack Prevention in Power Law Internets. - In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, 2001, 15-26. 22. Douligeris, C., A. Mitrokotsa. DDo S Attacks and Defense Mechanisms: Classification and State-of-the-Art. - Computer Networks, Vol. 44, 2004, No 5, 643-666. 23. Du, Ping, Akihiro Nakao. Over Court: DDoS Mitigation Through Credit-Based Traffic Segregation and Pathmigration. - IEEE Computer Communications, Vol. 33, 2010, 2164-2175. 24. Peng, T., C. Leckie, K. Ramamohanara o. Protection from Distributed Denial of Service Using History-Based IP Filtering. - IEEE, Vol. 1, 2003, 482-486. 25. Xiang, Yang, Wanlei Zhou. A Defense System Against DDo S Attacks by Large-Scale IP Traceback. - In: Third International Conference on Information Technology and Applications, IEEE Computer Society, 2005, 431-436. 26. Chao-Yang, Zhan g. DOS Attack Analysis and Study of New Measures to Prevent. - In: International Conference on Intelligence Science and Information Engineering, IEEE, 2011, 426-429. 27. www.xmco.fr/whitepapers/voip-security-layered-approach.pdf 28. Jeyanthi, N., N. Ch. S. N. Iyenga r. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDo S Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, 46-60. 29. Palmieri, F., U. Fiore. Network Anomaly Detection through Nonlinear Analysis. - Computers & Security, Science Direct, Vol. 29, 2010, No 7, 737-755. 30. Recurrance Plots. http://www.recurrence-plot.tk/glance.php
DOI: https://doi.org/10.2478/cait-2014-0002 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 11 - 24
Published on: Apr 9, 2014
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2014 N. Jeyanthi, R. Thandeeswaran, J. Vinithra, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.