4.5 Article

Utilizing bloom filters for detecting flooding attacks against SIP based services

期刊

COMPUTERS & SECURITY
卷 28, 期 7, 页码 578-591

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2009.04.007

关键词

Session Initiation Protocol (SIP); Voice over IP (VoIP); Flooding attacks; Denial of Service; Bloom filter; Security

向作者/读者索取更多资源

Any application or service utilizing the Internet is exposed to both general Internet attacks and other specific ones. Most of the times the latter are exploiting a vulnerability or misconfiguration in the provided service and/or in the utilized protocol itself. Consequently, the employment of critical services, like Voice over IP (VoIP) services, over the Internet is vulnerable to such attacks and, on top of that, they offer a field for new attacks or variations of existing ones. Among the various threats-attacks that a service provider should consider are the flooding attacks, at the signaling level, which are very similar to those against TCP servers but have emerged at the application level of the Internet architecture. This paper examines flooding attacks against VoIP architectures that employ the Session Initiation Protocol (SIP) as their signaling protocol. The focus is on the design and implementation of the appropriate detection method. Specifically, a bloom filter based monitor is presented and a new metric, named session distance, is introduced in order to provide an effective protection scheme against flooding attacks. The proposed scheme is evaluated through experimental test bed architecture under different scenarios. The results of the evaluation demonstrate that the required time to detect such an attack is negligible and also that the number of false alarms is close to zero. (C) 2009 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

On Android's activity hijacking prevention

Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis

Summary: This paper studies the impact of Android task and hijacking attacks on end users' data confidentiality, and proposes an operating system level defense mechanism. The developed tool demonstrates various vulnerable configurations, while the proposed solution has been shown to have negligible impact on Android task management.

COMPUTERS & SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

Launching Adversarial Label Contamination Attacks Against Malicious URL Detection

Bruno Marchand, Nikolaos Pitropakis, William J. Buchanan, Costas Lambrinoudakis

Summary: Web addresses serve as a vector for attackers to deliver harmful effects, but machine learning can automate the detection of malicious URLs. However, without defenses against adversarial manipulation, the accuracy of malicious URL detection can be significantly compromised.

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021) (2021)

Article Computer Science, Information Systems

Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations

Dimitra Georgiou, Costas Lambrinoudakis

Summary: This paper discusses the impact of the General Data Protection Regulation (GDPR) on the healthcare industry and provides guidelines on conducting a Data Protection Impact Assessment (DPIA). It focuses on identifying processing purposes, data categories, evaluating GDPR compliance, and conducting a Gap Analysis. The main contribution is outlining the organizational and legal requirements that healthcare organizations must meet.

FUTURE INTERNET (2021)

Article Computer Science, Information Systems

Incorporating privacy by design in Body Sensor Networks for Medical Applications: A Privacy and Data Protection Framework

Christos Kalloniatis, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas, Stefanos Gritzalis

Summary: This paper proposes a Privacy and Data Protection Framework for eHealth/M-Health systems to meet GDPR requirements and protect the rights of data subjects. The framework supports the combination of privacy by design principles with GDPR requirements, and provides a validation process to ensure the fulfillment of data protection objectives.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2021)

Proceedings Paper Computer Science, Information Systems

Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System

Dimitra Georgiou, Costas Lambrinoudakis

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020 (2020)

Proceedings Paper Computer Science, Information Systems

Microtargeting or Microphishing? Phishing Unveiled

Bridget Khursheed, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2020 (2020)

Proceedings Paper Computer Science, Information Systems

GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers

Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis

COMPUTER SECURITY, ESORICS 2019 (2020)

Proceedings Paper Computer Science, Information Systems

A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics

Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis

COMPUTER SECURITY, ESORICS 2019 (2020)

Proceedings Paper Computer Science, Information Systems

Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures

Nikolaos Pitropakis, Marios Logothetis, Gennady Andrienko, Jason Stefanatos, Eirini Karapistoli, Costas Lambrinoudakis

COMPUTER SECURITY, ESORICS 2019 (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

George Drivas, Argyro Chatzopoulou, Leandros Maglaras, Costas Lambrinoudakis, Allan Cook, Helge Janicke

2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020) (2020)

Article Computer Science, Information Systems

Compatibility of a Security Policy for a Cloud-Based Healthcare System with the EU General Data Protection Regulation (GDPR)

Dimitra Georgiou, Costas Lambrinoudakis

INFORMATION (2020)

Article Computer Science, Information Systems

GDPR compliance: proposed technical and organizational measures for cloud provider

Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis

INFORMATION AND COMPUTER SECURITY (2020)

Article Computer Science, Information Systems

Utilizing a privacy impact assessment method using metrics in the healthcare sector

Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis

INFORMATION AND COMPUTER SECURITY (2020)

Proceedings Paper Computer Science, Information Systems

The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers

Costas Lambrinoudakis

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (2018)

Proceedings Paper Engineering, Electrical & Electronic

Towards a Security Assurance Framework for Connected Vehicles

Panagiotis Pantazopoulos, Sammy Haddad, Costas Lambrinoudakis, Christos Kalloniatis, Konstantinos Maliatsos, Athanasios Kanatas, Andras Varadi, Matthieu Gay, Angelos Amditis

2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM) (2018)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)