Skip to main content

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In this chapter and the following chapter, we address the SIP layer attack detection. In this chapter we focus on the well-known flooding attack and develop an online scheme to detect and subsequently prevent the attack, by integrating a novel three-dimensional sketch design with the Hellinger distance detection technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. F. Gustafson and M. Lindahl, “Evaluation of statistical distributions for VoIP traffic modelling,” University Essay from University West, Department of Economics and IT, 2009.

    Google Scholar 

  2. J. Kurose and K. Ross, Computer Networking: A Top-Down Approach (4th ed.), Addison Wiley, 2007.

    Google Scholar 

  3. S. Muthukrishnan, “Data Streams: Algorithms and Applications,” in Proc. the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003.

    Google Scholar 

  4. W. Reed, “The Pareto, Zipf and Other Power Laws,” Economics Letters, vol. 74, no. 1, pp. 15–19, Dec. 2001.

    Article  MATH  Google Scholar 

  5. J. Rosenberg, H. Schulzrinne and G. Camarillo, “SIP: Session Initiation Protocol,” IETF RFC 3261, Jun. 2002.

    Google Scholar 

  6. H. Sengar, H. Wang, D. Wijesekera and S. Jajodia, “Detecting VoIP Floods Using the Hellinger Distance,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794–805, Jun. 2008.

    Article  Google Scholar 

  7. SIPp, [Online.] Available: http://sipp.sourceforge.net/.

  8. M. Thorup and Y. Zhang, “Tabulation Based 4-Universal Hashing with Applications to Second Moment Estimation,” in Proc. the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004.

    Google Scholar 

  9. G. Yang and L. Le Cam, Asymptotics in Statistics: Some Basic Concepts, second edition, Wiley, Mar. 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 The Author(s)

About this chapter

Cite this chapter

Tang, J., Cheng, Y. (2013). SIP Flooding Attack Detection. In: Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. SpringerBriefs in Computer Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8996-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8996-2_4

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8995-5

  • Online ISBN: 978-1-4614-8996-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics