Abstract
VoIP infrastructures are exposed to a large variety of security attacks, but the deployment of security safeguards may deteriorate their performance. Risk management provides new perspectives for addressing this issue. Risk models permit to reduce these attacks while maintaining the quality of such a critical service. These models often suffer from their complexity due to the high number of parameters to be configured. We therefore propose in this paper a self-configuration strategy for supporting runtime risk management in VoIP architectures. This strategy aims at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe this self-configuration strategy, show how it can be integrated into our runtime risk model. We then evaluate its deployment based on a proof-of-concept prototype, and quantify its performance through an extensive set of simulation results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Voice over IP Security Alliance, VoIP Security and Privacy Threat Taxonomy (October 2005), http://www.voipsa.org/Activities/taxonomy.php
Thermos, P., Takanen, A.: Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, Reading (2007)
ISO/IEC 27005, Information Security Risk Management, http://www.iso.org
Dabbebi, O., Badonnel, R., Festor, O.: Automated Runtime Risk Management for Voice over IP Networks and Services. In: Proc. of the 12th IEEE/IFIP Network Operations and Management Symposium, NOMS 2010 (April 2010)
Dantu, R., Kolan, P., Cangussu, J.W.: Network Risk Management using Attacker Profiling. Security and Communication Networks 2(1) (2009)
Bunini, M., Sicari, S.: Assessing the Risk of Intercepting VoIP Calls. Elsevier Journal on Computer Networks (May 2008)
d’Heureuse, N., Seedorf, J., Niccolini, S., Ewald, T.: Protecting SIP-based Networks and Services from Unwanted Communications. In: Proc. of IEEE/Global Telecommunications Conference (GLOBECOM 2008) (December 2008)
Gehani, A., Kedem, G.: RheoStat: Real Time Risk Management. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 296–314. Springer, Heidelberg (2004)
Soupionis, Y., Tountas, G., Gritzalis, D.: Audio Captcha for SIP-Based VoIP. Springer Journal 41, 25–38
Computer Literacy Tests: Are You Human?, Grossman. Times Magazine (2008)
Russell, T.: Session Initiation Protocol (SIP): Controlling Convergent Networks. McGraw-Hill, New York (2008)
Hamilton, J.: Time Series Analysis. Princeton Univ. Press, Princeton (1994)
Caldwell, J.G.: The Box-Jenkins Forecasting Technique. Ph.D. dissertation, University of North Carolina (1971)
R language, R project, http://cran.r-project.org/
Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: Prevention of Spam over IP Telephony (SPIT). NEC Technical Journal 1(2) (2006)
Schlegel, R., Niccolini, S., Tartarelli, S.: Spam over Internet Telephony (SPIT) Prevention Framework. In: Proc. of the IEEE GLOBECOM, San Francisco (2006)
Quinten, V.M., van de Meent, R., Pras, A.: Analysis of Techniques for Protection Against Spam over Internet Telephony. In: Pras, A., van Sinderen, M. (eds.) EUNICE 2007. LNCS, vol. 4606, pp. 70–77. Springer, Heidelberg (2007)
Vitalta, R., Apte, C.V., Hellerstein, J.L., Ma, S., Weiss, S.M.: Predictive Algorithms in the Management of Computer Systems. IBM System Journal 41(3) (2003)
Hossain, A., Nassar, M., Rahman, A.: Comparison of Finite mixture of ARMA-GARCH, Back Propagation Neural Networks and Support-Vector Machines in Forecasting Returns. Departement of Finance & Banking, Rajshahi University
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dabbebi, O., Badonnel, R., Festor, O. (2011). Econometric Feedback for Runtime Risk Management in VoIP Architectures. In: Chrisment, I., Couch, A., Badonnel, R., Waldburger, M. (eds) Managing the Dynamics of Networks and Services. AIMS 2011. Lecture Notes in Computer Science, vol 6734. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21484-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-21484-4_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21483-7
Online ISBN: 978-3-642-21484-4
eBook Packages: Computer ScienceComputer Science (R0)