Evolving RBF neural networks for time-series forecasting with EvRBF
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Informatics and computer science intelligent systems applications
The IMS Second Edition: IP Multimedia Concepts and Services
The IMS Second Edition: IP Multimedia Concepts and Services
Attack analysis & bio-inspired security framework for IPMultimedia subsystem
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
KEEL: a software tool to assess evolutionary algorithms for data mining problems
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special Issue on Evolutionary and Metaheuristics based Data Mining (EMBDM); Guest Editors: José A. Gámez, María J. del Jesús, José M. Puerta
Detecting flooding attacks against IP Multimedia Subsystem (IMS) networks
AICCSA '08 Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
Improved use of continuous attributes in C4.5
Journal of Artificial Intelligence Research
Induction of fuzzy-rule-based classifiers with evolutionary boosting algorithms
IEEE Transactions on Fuzzy Systems
The IMS service platform: a solution for next-generation network operators to be more than bit pipes
IEEE Communications Magazine
RTP-miner: a real-time security framework for RTP fuzzing attacks
Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video
Performance evaluation of evolutionary algorithms for road detection
Proceedings of the 12th annual conference on Genetic and evolutionary computation
Principles, Systems and Applications of IP Telecommunications
Using differential evolution to optimize 'learning from signals' and enhance network security
Proceedings of the 13th annual conference on Genetic and evolutionary computation
Characteristics of real open SIP-Server traffic
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
The subsumption mechanism for XCS using code fragmented conditions
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
Hi-index | 0.00 |
The Session Initiation Protocol (SIP) is the de facto standard for user's session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Multimedia Subsystem (IMS) framework. In this paper, we first analyze the role of SIP based floods in the Denial of Service (DoS) attacks on the IMS. Afterwards, we present an online intrusion detection framework for detection of such attacks. We analyze the role of different evolutionary and non-evolutionary classifiers on the classification accuracy of the proposed framework. We have evaluated the performance of our intrusion detection framework on a traffic in which SIP floods of varying intensities are injected. The results of our study show that the evolutionary classifiers like sUpervised Classifier System (UCS) and Genetic clASSIfier sySTem (GAssist) can even detect low intensity SIP floods in realtime. Finally, we formulate a set of specific guidelines that can help VoIP service providers in customizing our intrusion detection framework by selecting an appropriate classifier-depending on their requirements in different service scenarios.