ARTICLE
TITLE

Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier

SUMMARY

The Session Initiation Protocol (SIP) is one of the most common protocols that are used for signaling function in Voice over IP (VoIP) networks. The SIP protocol is very popular because of its flexibility, simplicity, and easy implementation, so it is a target of many attacks. In this paper, we propose a new system to detect the Denial of Service (DoS) attacks (i.e. malformed message and invite flooding) and Spam over Internet Telephony (SPIT) attack in the SIP based VoIP networks using a linear Support Vector Machine with l1 regularization (i.e. l1-SVM) classifier. In our approach, we project the SIP messages into a very high dimensional space using string based n-gram features. Hence, a linear classifier is trained on the top of these features. Our experimental results show that the proposed system detects malformed message, invite flooding, and SPIT attacks with a high accuracy. In addition, the proposed system outperformed other systems significantly in the detection speed.

 Articles related

(1) Ariyono Setiawan (Department of Air Transportation Management, Aviation Polytechnic of Surabaya, Indonesia) (2) I Gede Susrama Mas Diyasa (Department of Informatics Engineering, Universitas Pembangunan Nasional “Veteran” Jatim, Indonesia) (3) Moch Hatta (Department of Computer Engineering, Universitas Maarif Hasyim Latif Sidoarjo, Indonesia) (4) Eva Yulia Puspaningrum (Department of Informatics Engineering, Universitas Pembangunan Nasional “Veteran” Jatim, Indonesia)    

Healthy and superior sperm is the main requirement for a woman to get pregnant. To find out how the quality of sperm is needed several checks. One of them is a sperm analysis test to see the movement of sperm objects, the analysis is observed using a mic... see more


Muhammad Nur Alam Roslan    

Abstract— In the era of digitalization, many companies, agencies and even homes in the world have installed the closed- circuit television (CCTV) in their premise as the surveillance and security purposes. The footage videos from CCTV have been used as t... see more


Saidat Adebukola Onashoga,Adio Taofiki Akinwale,Opeyemi L. Amusa,Gboyega Adebayo    

Intrusion Detection Systems (IDSs) are an integral part of an organization's infrastructure. Without an IDS facility in place to monitor network and host activities, attempted and successful intrusion attempts may go unnoticed. This study proposed a Coll... see more


Nguyen N. Tran, Dang L. Khoa, Vo T. Tri, Ha X. Nguyen    

Based on convex programming for optimization, a closed-from solution of superimposed (SP) training on linearly precoded data for jointly optimal channel estimation and symbol detection is proposed in this paper for MIMO-OFDM systems. The newly designed m... see more


Mojtaba Jamshidi,Milad Ranjbari,Mehdi Esnaashari,Nooruldeen Nasih Qader,Mohammad Reza Meybodi    

Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, inclu... see more