A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack

نویسندگان

چکیده

Voice over Internet Protocol (VoIP) and its underlying Session Initiation (SIP) are widely deployed technologies since they provide an efficient fast means of both voice data communication a single network. However, in spite their advantages, also have security threats due to the inherent vulnerabilities (IP) that can potentially be exploited by hackers. This study introduces novel defense mechanism effectively combat advanced attacks exploit identified some less-known features SIP. The SIP-DRDoS (SIP-based distributed reflection denial service) attack, which survive existing systems, is attack performed on SIP network through multiplication legitimate traffic. In this study, we propose consists statistics, inspection, action modules mitigate attack. We implement utilizing our SIP-based audit software VoIP/SIP lab environment simulates enterprise-grade then utilize tool realize against Our experimental results prove approach do deep packet analysis for traffic, detect flood attacks, them dropping packets. While with around 1 Gbps traffic dramatically escalates CPU (central processing unit) usage server up 74%, reduces it down 17% within 6 min after initiated. represents significant advancement mechanisms demonstrates potential protect VoIP systems DRDoS attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

A major disturbance for network providers in recent years have been Distributed Reflective Denial-of-Service (DRDoS) attacks. In such an attack, the adversary spoofs the IP address of a victim and sends a flood of tiny packets to vulnerable services. The services then respond to spoofed the IP, flooding the victim with large replies. Led by the idea that an attacker cannot fabricate the number ...

متن کامل

A Novel Approach of Detection and Mitigation of DDOS Attack

-We are in the era of internet and depend on it for every necessary requirement. It is the tendency of the some human to have destructive approach rather than having constructive approach. Among the abuse and misuse of internet, the distributed denial of service attack (DDOS) is the most hectic one. People have carried out various method of mitigation using the CAPTCHA (Completely Automated Pub...

متن کامل

Novel Approach To Cell-Counting-Based Attack Against Tor

Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of the secrecy systems pack the application data into equal-sized cells. Through extensive experiments on Tor, we originate that the size of IP packets in the Tor network can be very ac...

متن کامل

Amplification and DRDoS Attack Defense - A Survey and New Perspectives

The severity of amplification attacks has grown in recent years. Since 2013 there have been at least two attacks which involved over 300Gbps of attack traffic. This paper offers an analysis of these and many other amplification attacks. We compare a wide selection of different proposals for detecting and preventing amplification attacks, as well as proposals for tracing the attackers. Since sou...

متن کامل

Sybil Nodes as a Mitigation Strategy Against Sybil Attack

Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13031864