Skip to main content

Econometric Feedback for Runtime Risk Management in VoIP Architectures

  • Conference paper
Managing the Dynamics of Networks and Services (AIMS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6734))

Abstract

VoIP infrastructures are exposed to a large variety of security attacks, but the deployment of security safeguards may deteriorate their performance. Risk management provides new perspectives for addressing this issue. Risk models permit to reduce these attacks while maintaining the quality of such a critical service. These models often suffer from their complexity due to the high number of parameters to be configured. We therefore propose in this paper a self-configuration strategy for supporting runtime risk management in VoIP architectures. This strategy aims at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe this self-configuration strategy, show how it can be integrated into our runtime risk model. We then evaluate its deployment based on a proof-of-concept prototype, and quantify its performance through an extensive set of simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Voice over IP Security Alliance, VoIP Security and Privacy Threat Taxonomy (October 2005), http://www.voipsa.org/Activities/taxonomy.php

  2. Thermos, P., Takanen, A.: Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, Reading (2007)

    Google Scholar 

  3. ISO/IEC 27005, Information Security Risk Management, http://www.iso.org

  4. Dabbebi, O., Badonnel, R., Festor, O.: Automated Runtime Risk Management for Voice over IP Networks and Services. In: Proc. of the 12th IEEE/IFIP Network Operations and Management Symposium, NOMS 2010 (April 2010)

    Google Scholar 

  5. Dantu, R., Kolan, P., Cangussu, J.W.: Network Risk Management using Attacker Profiling. Security and Communication Networks 2(1) (2009)

    Google Scholar 

  6. Bunini, M., Sicari, S.: Assessing the Risk of Intercepting VoIP Calls. Elsevier Journal on Computer Networks (May 2008)

    Google Scholar 

  7. d’Heureuse, N., Seedorf, J., Niccolini, S., Ewald, T.: Protecting SIP-based Networks and Services from Unwanted Communications. In: Proc. of IEEE/Global Telecommunications Conference (GLOBECOM 2008) (December 2008)

    Google Scholar 

  8. Gehani, A., Kedem, G.: RheoStat: Real Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 296–314. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Soupionis, Y., Tountas, G., Gritzalis, D.: Audio Captcha for SIP-Based VoIP. Springer Journal 41, 25–38

    Google Scholar 

  10. Computer Literacy Tests: Are You Human?, Grossman. Times Magazine (2008)

    Google Scholar 

  11. Russell, T.: Session Initiation Protocol (SIP): Controlling Convergent Networks. McGraw-Hill, New York (2008)

    Google Scholar 

  12. Hamilton, J.: Time Series Analysis. Princeton Univ. Press, Princeton (1994)

    MATH  Google Scholar 

  13. Caldwell, J.G.: The Box-Jenkins Forecasting Technique. Ph.D. dissertation, University of North Carolina (1971)

    Google Scholar 

  14. R language, R project, http://cran.r-project.org/

  15. Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: Prevention of Spam over IP Telephony (SPIT). NEC Technical Journal 1(2) (2006)

    Google Scholar 

  16. Schlegel, R., Niccolini, S., Tartarelli, S.: Spam over Internet Telephony (SPIT) Prevention Framework. In: Proc. of the IEEE GLOBECOM, San Francisco (2006)

    Google Scholar 

  17. Quinten, V.M., van de Meent, R., Pras, A.: Analysis of Techniques for Protection Against Spam over Internet Telephony. In: Pras, A., van Sinderen, M. (eds.) EUNICE 2007. LNCS, vol. 4606, pp. 70–77. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Vitalta, R., Apte, C.V., Hellerstein, J.L., Ma, S., Weiss, S.M.: Predictive Algorithms in the Management of Computer Systems. IBM System Journal 41(3) (2003)

    Google Scholar 

  19. Hossain, A., Nassar, M., Rahman, A.: Comparison of Finite mixture of ARMA-GARCH, Back Propagation Neural Networks and Support-Vector Machines in Forecasting Returns. Departement of Finance & Banking, Rajshahi University

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 IFIP International Federation for Information Processing

About this paper

Cite this paper

Dabbebi, O., Badonnel, R., Festor, O. (2011). Econometric Feedback for Runtime Risk Management in VoIP Architectures. In: Chrisment, I., Couch, A., Badonnel, R., Waldburger, M. (eds) Managing the Dynamics of Networks and Services. AIMS 2011. Lecture Notes in Computer Science, vol 6734. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21484-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21484-4_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21483-7

  • Online ISBN: 978-3-642-21484-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics