The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Overload is a challenging problem for a SIP server because the built-in overload control mechanism based on generating rejection messages could not prevent the server from collapsing due to congestion. In this scenario, the paper presents an overload mechanism combining a local and a remote solution. The local part of the overload control mechanism is based on the appropriate queueing structure and...
The Session Initiation Protocol (SIP) together with its extension for presence and messaging is considered to be an enabler of converged communications. At the core, SIP is a signaling protocol used for establishing sessions in an IP network. SIP has been adopted by 3GPP for multimedia streaming services in cellular networks. This paper presents a formalized and executable Colored Petri Net model...
Recently, the Session Initiation Protocol (SIP) has been adopted as the signaling protocol for multimedia services. In this paper, we present a SIP traffic modeling and analysis system for Internet telephony services. The proposed modeling process mainly uses statistical analysis schemes, such as the Mahalanobis distance and a weighted sliding windows; this process can build traffic profiles after...
Through deeply analysis of INVITE flooding attack of SIP based VoIP system, a novel VoIP flooding detection scheme called CDVFD (Call Duration based VoIP Flooding Detection) is presented. The CDVFD method makes use of SIP signaling bidirectional interaction, and it can make fast detection using Chi-square value, and can distinguish from normal high VoIP traffic. Experimental results show the effectiveness...
As a main signaling protocol for multimedia sessions in the Internet, SIP (Session Initiation Protocol) introduces a retransmission mechanism to maintain the reliability for its realtime transmission. However, retransmission will make the server overload worse. Recent collapse of SIP servers due to emergencyinduced call volume indicates that the built-in SIP overload control mechanism cannot prevent...
In VoIP service network, attack traffic has abnormal characteristics according to the kind of attack. Mass Call Spam (MCS) attack that spammers send via Internet Telephony service to a large number of users has also an abnormal traffic pattern. We propose an analysis scheme for detecting MCS in Session Initiation Protocol (SIP)-based Internet Telephony service. In the proposed scheme, efficient statistical...
The IP Multimedia Subsystem (IMS) defined by the 3rd Generation Partnership Project (3GPP) and 3GPP2 provides a platform for the provision of multimedia services with quality of service (QoS). In addition, this service architecture allows third-party vendors to create advanced multimedia and multisession services across wireless and wireline network access. The Session Initiation Protocol (SIP) supports...
As other signaling protocols in the past, also SIP suffers of server overload leading to performance collapse. In this framework, recent Internet drafts propose the improvements of overload control mechanisms already presented in SIP and/or a closed loop system model for overload avoidance. In this framework, the paper presents the system simulator developed extending the network simulator (ns-2)...
In recent years, Internet Protocol (IP) telephony has been a real alternative to the traditional public switched telephone networks (PSTN). IP telephony offers more flexibility in the implementation of new features and services. The session initiation protocol (SIP) is becoming a popular signaling protocol for Voice over IP (VoIP) based applications. The SIP proxy server is a software application...
In recent years, transmission of packets over Internet has been a real alternative to the traditional Public Switched Telephone Networks (PSTN). The Internet protocol (IP) offers more flexibility in the design and implementation of features and services. The session initiation protocol (SIP) is a commonly adopted signaling protocol for Voice over IP (VoIP) by many telecommunication industries. Since...
Being a fast-growing Internet application, streaming media application shares the network resources with the regular Internet traffic, and is susceptible to the existing security holes of the Internet, such as SETUP request flooding attack, session hijacking attack, TEARDOWN attack and RTP attack. In this paper, we propose a highly needed streaming media intrusion detection system. Our approach is...
Presence is a service that allows a user to be informed about the reachability, availability, and willingness of communication of another user. Presence service has become a key enabler for many popular applications such as instant messaging and push-to-talk. Traffic to a presence server is resulted by user behaviors such as login/logout, online status modification, and automatic status refresh by...
IP multimedia subsystems (IMS) is using session initiation protocol (SIP) as signalling protocol. SIP is becoming computing intensive and hence the ability of entry and exit proxies to process SIP messages has great impact on the overall performance of the IMS core network. This paper shows that the flow of SIP messages during handover process in the IMS core network complies with the well known central...
A simple and yet effective denial of service (DoS) attack on voice over IP (VoIP) proxies that based on session initiation protocol (SIP), is to flood the server with requests that their addresses do not exist and are irresolvable. Different security schemes and possible attacks have studied from the qualitative view on the most of network security researches and these researches are less considered...
The increasing usage of Instant Messaging(IM) applications worldwide continues to grow year on year. However, larger numbers of users creates problems with greater network traffic, interoperability and proprietary protocol dependence. Network traffic due to presence information being exchanged between users and servers needs to be considered, but is it possible to estimate or measure this traffic?...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.