Performance of Voip Services on a Docsis Network Targeted by a Denial of Service Attack
نویسندگان
چکیده
Over 48 million end users worldwide utilize cable modems as their means of accessing the Internet at high speeds. Networks which provide access via cable modems utilize Data Over Cable Service Interface Specifications (DOCSIS) as their means of network management. As availability and utilization to the Internet increases (especially at high speeds supported by broadband access), so does the opportunity for malicious activity against those users. Denial-of-service (DoS) attacks are one form of malicious activity and one of the most common. In commonplace switched Ethernet, wired networks, a DoS attack requires relatively high levels of computing and network resources to successfully deny service. In DOCSIS-based networks, high levels of computing and network resources aren't mandatory in order to sufficiently degrade a network segment, especially when the objective of the attack is to reduce the quality of Voice over Internet Protocol (VoIP) sessions. This phenomenon hinges on the Media Access Control layer protocol employed by DOCSIS used for managing access to the upstream transmission medium. The implications of this phenomenon are widespread as end users looking for cost-saving voice telecommunications services migrate to best effort VoIP such as provided by Vonage.
منابع مشابه
RESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملThe Interaction Between the DOCSIS 1.1/2.0 MAC Protocol and TCP Application Performance
The deployment of data-over-cable broadband Internet access continues to unfold throughout the world. While there are competing technologies, the Data over Cable (DOCSIS) 1.1/2.0 effort is emerging as the single standard. There has been little research exploring the impact that the DOCSIS 1.1/2.0 MAC and physical layers has on the performance of Internet applications. We have developed a model ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007