Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
4 results
Search Results
Item Effectiveness of SIP messages on SIP server(2013) Bansal, A.; Kulkarni, P.; Pais, A.R.Voice over Internet Protocol (Voice over IP, VoIP) is one of a family of communication protocols, and transmission technologies. It is used for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Session Initiation Protocol (SIP) is a signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP). There are several DoS attacks by which we can disturb SIP server. In this paper, more importance has been given to DoS attack by flooding of different SIP-messages. A little work is done to analyze the performance of SIP server and quality of ongoing VoIP calls under DoS attacks. We show the utilization of CPU and memory during the multiple simultaneous calls. We have done our study using a customized analysis tool that has the ability to synthesize and launch flooding of different SIP messages. We define the performance metrics to measure the quality of VoIP calls under DoS attack. We have developed some programs and integrated them in a real SIP test bed environment to measure the performance of SIP server and quality of VoIP calls under DoS attack. Our measurements show that a standard SIP server can be easily overloaded by simple call requests. It also shows that simple call request can degrade quality of ongoing calls. © 2013 IEEE.Item Mitigation of flooding based denial of service attack against session initiation protocol based VoIP system(Institute of Electrical and Electronics Engineers Inc., 2015) Bansal, A.; Pais, A.R.The Session Initiation Protocol (SIP) is the most popular signaling protocol used in Voice over Internet Protocol (VoIP). The flooding based DoS attack can be performed by sending only hundreds of SIP messages per second to a SIP server. In this paper, we have proposed a new mitigation scheme for SIP based VoIP system which can protect it from flooding based DoS attack. This scheme is based on the INVITE and BYE messages of the SIP protocol. A prototype system for the flooding based DoS attack on SIP server and a mitigation mechanism has been designed and implemented. The performance of the proposed system has been evaluated and found to be better than other existing mechanisms. © 2015 IEEE.Item DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks(Elsevier B.V., 2023) Adiwal, S.; Rajendran, B.; Shetty D, P.S.; Sudarsan, S.D.Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. The malicious user targets DNS by taking advantage of vulnerabilities in DNS. The most complex attacks in the DNS attacks vector include Distributed Denial of Service (DDoS) based DNS amplification attacks and sophisticated DNS tunneling attacks. An Intrusion Detection System (IDS) is a solution available to monitor the traffic for intrusion in the network but not exclusively for DNS intrusions. In this research paper, we present – DNS Intrusion Detection (DID), a system integrated into SNORT – a prominent open-source IDS, to detect major DNS-related attacks. We developed novel IDS signatures for various tools used in the tunneling, amplification, and DoS attacks and added them to the existing ruleset file of IDS to detect DNS-based intrusions. Our approach successfully identifies empirical DNS attacks carried out by various known tools available over the Internet. Evaluation of DID showed a high detection rate and a very low false-positive rate. © 2023 The Author(s)Item Vulnerability Testing of RESTful APIs Against Application Layer DDoS Attacks(Science and Information Organization, 2025) Sivakumar, K.; Santhi Thilagam, P.S.In recent years, modern mobile, web applications are shifting from monolithic application to microservice based application because of the issues such as scalability and ease of maintenance.These services are exposed to the clients through Application programming interface (API). APIs are built, integrated and deployed quickly.The very nature of APIs directly interact with backend server, the security is paramount important for CAP. Denial of service attacks are more serious attack which denies service to legitimate request. Rate limiting policies are used to stop the API DoS attacks. But by passing rate limit or flooding attack overload the backend server. Even sophisticated attack using http/2 multiplexing with multiple clients leads severe disruptions of service. This research shows that how sophisticated multi client attack on high workload end point leads to a dos attack. © (2025), (Science and Information Organization). All rights reserved.
