A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services

S Kumar, M Dwivedi, M Kumar, SS Gill - Computer Science Review, 2024 - Elsevier
The advent of cloud computing has made a global impact by providing on-demand services,
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …

Application layer denial-of-service attacks and defense mechanisms: a survey

N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Enhancing cybersecurity in smart grids: false data injection and its mitigation

DB Unsal, TS Ustun, SMS Hussain, A Onen - Energies, 2021 - mdpi.com
Integration of information technologies with power systems has unlocked unprecedented
opportunities in optimization and control fields. Increased data collection and monitoring …

Utilizing bloom filters for detecting flooding attacks against SIP based services

D Geneiatakis, N Vrakas, C Lambrinoudakis - computers & security, 2009 - Elsevier
Any application or service utilizing the Internet is exposed to both general Internet attacks
and other specific ones. Most of the times the latter are exploiting a vulnerability or …

A self-learning system for detection of anomalous sip messages

K Rieck, S Wahl, P Laskov, P Domschitz… - … Conference on Principles …, 2008 - Springer
Current Voice-over-IP infrastructures lack defenses against unexpected network threats,
such as zero-day exploits and computer worms. The possibility of such threats originates …

An ontology description for SIP security flaws

D Geneiatakis, C Lambrinoudakis - Computer Communications, 2007 - Elsevier
Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as
compared to other protocols like MGCP or H. 323. However, the open SIP architecture …

Detecting anomalous behavior in VoIP systems: A discrete event system modeling

D Golait, N Hubballi - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Session initiation protocol (SIP) is an application layer protocol used for signaling purposes
to manage voice over IP connections. SIP being a text-based protocol is vulnerable to a …

The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems

Z Tsiatsikas, G Kambourakis, D Geneiatakis… - IEEE …, 2018 - ieeexplore.ieee.org
VoIP services, in general, and session initiation protocol (SIP) ones, in particular, continue to
grow at a fast pace and have already become a key component of next-generation networks …

Two layer Denial of Service prevention on SIP VoIP infrastructures

S Ehlert, G Zhang, D Geneiatakis… - Computer …, 2008 - Elsevier
The emergence of Voice over IP (VoIP) has offered numerous advantages for end users and
providers alike, but simultaneously has introduced security threats, vulnerabilities and …