A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP

Provided by: University of Thai Chamber of Commerce
Topic: Security
Format: PDF
Network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volume is usually both complex (slow) and privacy-neglecting. Especially, when it comes to VoIP, the literature on how audit trails can be exploited to identify attacks remains scarce. This paper provides an entropy-driven, privacy preserving, and practical framework for detecting resource consumption attacks in VoIP ecosystems.

Find By Topic