Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/6827
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, A. | - |
dc.contributor.author | Santhi Thilagam, P. | - |
dc.contributor.author | Pais, A.R. | - |
dc.contributor.author | Sharma, V. | - |
dc.contributor.author | Sadalkar, K.M. | - |
dc.date.accessioned | 2020-03-30T09:46:12Z | - |
dc.date.available | 2020-03-30T09:46:12Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Communications in Computer and Information Science, 2011, Vol.147 CCIS, , pp.336-339 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/6827 | - |
dc.description.abstract | Low rate Denial-of Service, DoS, attack recently emerged as the greatest threat to enterprise VoIP systems. Such attacks are difficult to detect and capable of discovering vulnerabilities in protocols with low rate traffic and it noticeably affects the performance of Session Initiation Protocol, SIP, communication. In this paper, we deeply analysis the resilience of SIP server against certain low rate DoS attacks. For this purpose we define performance metrics of SIP server under attack and non-attack scenarios. The performance degradation under attacks gives a measure of resilience of the SIP server. In order to generate normal SIP traffic and the attacks, we defined our own XML scenarios and implemented them using a popular open source tool known as SIPp. The system under evaluation was an open source SIP server. � 2011 Springer-Verlag. | en_US |
dc.title | Towards evaluating resilience of SIP server under low rate DoS attack | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.