Download now Free registration required
The paper proposes an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The lDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that the system can detect typical attacks within a reasonable amount of delay time.
- Format: PDF
- Size: 650 KB