Analysis of DDoS Attacks in Heterogeneous VoIP Networks: A Survey
Amita Chauhan1, Nitish Mahajan2, Harish Kumar3, Sakshi Kaushal4

1Amita Chauhan, University Institute of Engineering and Technology, Panjab University, Chandigarh, India.

2Nitish Mahajan, University Institute of Engineering and Technology, Panjab University, Chandigarh, India.

3Harish Kumar, University Institute of Engineering and Technology, Panjab University, Chandigarh, India.

4Sakshi Kaushal, University Institute of Engineering and Technology, Panjab University, Chandigarh, India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 14 April 2019 | Manuscript Published on 24 May 2019 | PP: 242-246 | Volume-8 Issue-6S3 April 2019 | Retrieval Number: F10490486S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Significant changes have been taking place in interactive media transmission as traditional circuit-based PSTN is substituted by packet-based networks called next generation networks (NGN) that use internet protocol (IP). NGN is believed to completely restructure the communication systems. Voice over IP (VoIP) with its cost effective deployment has transpired as a paramount instrument for multimedia communication. Session Initiation Protocol (SIP) is currently the most popular application layer protocol used for signalling purposes to control VoIP connections between communicating parties. SIP, being a simple text-based protocol, is pregnable to various security breaches and Distributed Denial of Service (DDoS) attacks happen to be one of the most devastating cyber threats. In this paper, a detailed analysis on detection of DDoS attacks in SIP based VoIP networks is presented. Machine learning evolves as a building block in cyber security solutions with a large number of techniques available to automate the detection of network attacks and make robust and quick network defence systems. Numerous approaches exist in state of the art for identifying anomalous behaviour in VoIP traffic. This paper includes important aspects that need to be taken into account by the professionals when developing cyber security systems for such networks.

Keywords: Stretcher, Patient Transfer, Safety the stretcher is only designed for linear movement.
Scope of the Article: Communication