A comparative study of different methods of infiltration detection and presenting a new method to reduce SPITs in computer networks

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 823

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

SENACONF01_126

تاریخ نمایه سازی: 25 فروردین 1394

Abstract:

One problem of internet telephone networks which is expected to create some problems such as email spams for telephone systems is SPITs (Spam Over Internet Telephone). Thedetection of SPITs in internet telephone networks must be done immediately, irrespective of content and prior to the initiation of a session. On the other hands, process of disruptivecontacts is exactly same as the process of healthy contacts which this can make the detectionof SPITs challenging. Therefore, by introducing a new method which concentrates on users’ behavior and a look at susceptibilities existing in Voice over Internet Protocol (VOIP) which can lead to SPITs, present paper attempts to introduce an anti-SPIT system which is able to detect simultaneousdisruptive contacts in signaling stage. Taking into account the susceptibilities leading to SPITs, the proposed system identifiesusers’ suspicious behaviors, and following examining contact characteristics, using a response/challenge method allow only entrance of users who have made a normal contact. The evaluation of the proposed method is done using its simulations, and the resultant detection rate and incorrect alarm rate indicate the success of this method in preventing the entrance of SPITs into a network.

Authors

Javad Akbari

Arak Branch,Islamic Azad UniversityArak Computer Engineering Department,Iran

Zeynab Rostami

Arak Branch,Islamic Azad UniversityArak Computer Engineering Department,Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Mitigation by a SPITه [5]. B.Mathieu, Q.Loudier, Y.Gourhant, F. Bougant, ...
  • . Y. Rebahi, D. Sisalem, T. Magedanz, F. Fokus, K. ...
  • . N.J. Croft, M.S. Olivier, ":A Model for Spam Prevention ...
  • Marias, D .Gritzalis, B .Pannier, O _ Capsada, T. Golubenco, ...
  • . H. K. Bokharaei, A. Sahraei, Y. Ganjali, R. Keralapura, ...
  • . R. Dantu, P. Kolan, "Detecting Spam in VOIP Networks, ...
  • . S. M. Akramus Salehin, "Using Decoys to Block SPIT ...
  • . P. Stamatiou, D. Gritzalis, "Countering Unsolicited Contacts in the ...
  • http ://mo _ co _ za/open/voip spam.pdf , 2005. [3]. ...
  • . Y. Soupionis, G. Marias, S. Ehlert, Y. Rebahi, S. ...
  • . A.Ahson, M.Lyas. "SIP Handbook" Taylor & Francis Group Publication, ...
  • . Z.Asgharian, H.Asgharian, A. Akbari, B. Raahemi, "A Framework for ...
  • Y. Bai, "Analysis of EnterpriseVo IP Traffic from aWire line ...
  • نمایش کامل مراجع