Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams
Abstract
:1. Introduction
- Network segmentation by creating VLANs and using hardware firewalls;
- Load balancing—distributing traffic across multiple servers;
- Blocking traffic from known or suspected IP addresses that have been linked to DoS attacks in the past or present;
- Limiting the speed of the traffic, which can prevent a DoS attack from overloading the server;
- Using Content Delivery Networks (CDNs)—this distributes the content of the website across multiple locations; thus, a DoS attack could not bring down the entire site.
- It solves the problem wherein the expensive physical network devices needed for experimental networks are not available;
- The modelled experimental network is completely closed. Thus, studies of different attacks will be 100% controllable and there is no danger of the attacks going outside the controlled area.
2. Related Work
3. Modeling Platform, Tools, and Research Methodology Used
3.1. Modeling Platform Used
3.2. Tools Used
- Kali Linux (2024.2): this operating system and the multitude of different built-in tools were used for various tests/studies related to determining the level of network security and vulnerability testing [48];
- Wireshark (version 4.0.7): this network protocol analyzer can “capture” all exchanged packets between network devices in an IP network [49]. Due to its integration with GNS3, all nodes in the modeled network can be monitored through Wireshark. This tool “captured” all packets that were exchanged between Asterisk and the users;
- Colasoft Capsa Free (version 11.1): this network analyzer was used to monitor the traffic by displaying information about generated traffic, number of TCP packets, traffic generated by certain protocols, and other traffic-related factors [50];
- Colasoft Ping Tool (version 2.0): a tool that can be used to measure in real time the value of the round-trip delay [51]. The results of the measurement can be used to make graphs to show how the round-trip delay changed over a given period of time.
3.3. Research Methodology
4. Results and Discussion
4.1. Results for Only Voice Streams
4.1.1. Results from the TCP SYN Attack
4.1.2. Results during the TCP ACK Attack
4.1.3. Results from the TCP RST Attack
4.1.4. Results during the TCP FIN Attack
4.1.5. Summarized Results for the Voice-stream study
4.1.6. Discussion of the Obtained Results for the Voice-Stream study
4.2. Results for Video Streams Only
4.2.1. Results during the TCP SYN Attack
4.2.2. Results during the TCP ACK Attack
4.2.3. Results Obtained during the TCP RST Attack
4.2.4. Results Obtained during the TCP FIN Attack
4.2.5. Summarized Results for the Video-Stream Study
4.2.6. Discussion of the Results Obtained for the Video-Stream Study
5. Conclusions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Liu, C.; Du, D.; Zhang, C.; Peng, C.; Fei, M. Observability Analysis of Networked Control Systems Under DoS Attacks. In Proceedings of the IECON 2023 49th Annual Conference of the IEEE Industrial Electronics Society, Singapore, Singapore, 16–19 October 2023. [Google Scholar]
- Sinha, S. Network layer DoS Attack on IoT System and location identification of the attacker. In Proceedings of the Third International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 2–4 September 2021. [Google Scholar]
- Gogoi, B.; Ahmed, T. HTTP Low and Slow DoS Attack Detection using LSTM based deep learning. In Proceedings of the 19th India Council International Conference (INDICON), Kochi, India, 24–26 November 2022. [Google Scholar]
- Li, J.; Zhang, Y. Resilient DoS Attack Detector Design for Cyber-Physical Systems. In Proceedings of the 12th International Conference on Renewable Energy Research and Applications (ICRERA), Oshawa, ON, Canada, 29 August–1 September 2023. [Google Scholar]
- Ramadhan, U.F.; Prastiantono, A.; Park, J.; Kim, D.; Yoon, M. Impact Analysis of DoS Attack at Vulnerable Point with the Exchange of Frequency Containment Reserves Control in MIDC System. In Proceedings of the International Conference on Technology and Policy in Energy and Electric Power (ICT-PEP), Jakarta, Indonesia, 18–20 October 2022. [Google Scholar]
- Sarkunavathi, A.; Srinivasan, V. A Scrutinized study on DoS attacks in Wireless Sensor Networks and need of SDN in Mitigating DoS attacks. In Proceedings of the International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 27–29 January 2021. [Google Scholar]
- Mladenov, B.; Iliev, G. Studying the effect of internal DOS attacks over SDN controller during switch registration process. In Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 19–22 July 2022. [Google Scholar]
- Jekov, B.; Dimitrov, W.; Panayotova, G.S.; Kovatcheva, E. Intelligent protection of Internet of things systems. In Proceedings of the 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Maldives, Maldives, 16–18 November 2022. [Google Scholar]
- Dimitrov, W.; Spasov, K.; Trenchev, I.; Syarova, S. Complexity Assessment of Research Space for Smart City Cybersecurity. IFAC-Pap. 2022, 55, 1–6. [Google Scholar] [CrossRef]
- Lacerda, M.J.; Oliveira, P.M.; Palma, J.M. Control design for cyber-physical systems under DoS attacks. In Proceedings of the 2022 IEEE International Conference on Automation/XXV Congress of the Chilean Association of Automatic Control (ICA-ACCA), Curicó, Chile, 24–28 October 2022. [Google Scholar]
- Sriharipriya, K.C.; Mary, G.I.; Abishek, R.; Panja, A. Manipulation and Detection of DOS attacks on IEEE802. 11 Protocol. In Proceedings of the 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), Vellore, India, 5–6 May 2023. [Google Scholar]
- Taher, M.A.; Iqbal, H.; Tariq, M.; Sarwat, A.I. Disruptive Effects of Denial-of-Service (DoS)Attacks on Microgrid Distributed Control: Altered Communication Topology, Voltage Stability, and Accurate Power Allocation. In Proceedings of the 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG), Wollongong, Australia, 3–6 December 2023. [Google Scholar]
- Gore, S.; Nagalakshmi, Y.; Knowles, P.; Gupta, K.G.; Jagtap, N.S.; Sali, R.P. Improvised Ensemble Model for Fast Prediction of DoS/DDoS Attacks in Various Networks. In Proceedings of the 2023 1st International Conference on Cognitive Computing and Engineering Education (ICCCEE), Pune, India, 27–29 April 2023. [Google Scholar]
- Srivastava, A.; Sharma, H.S.; Rawat, R.; Garg, N. Detection of Cyber Attack in IoT Based Model Using ANN Model with Genetic Algorithm. In Proceedings of the 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), Greater Noida, India, 9–10 February 2024. [Google Scholar]
- Siriyapuraju, S.J.; Gowri, V.S.; Balla, S.; Vanika, M.K.; Gandhi, A. DoS and DDoS attack detection using Mathematical and Entropy Methods. In Proceedings of the 2nd International Conference on Paradigm Shifts in Communications Embedded Systems, Machine Learning and Signal Processing (PCEMS), Nagpur, India, 5–6 April 2023. [Google Scholar]
- Zhou, L.; Peng, C.; Cao, Z. Communication and Control Co-design for Networked Control Systems under DoS Attacks and Time-varying Delays. In Proceedings of the 4th International Conference on Control and Robotics (ICCR), Guangzhou, China, 2–4 December 2022. [Google Scholar]
- Lazarova, M.; Sapundzhi, F. Stochastic Modeling with Applications in Supply Chain Management and ICT Systems. Computation 2023, 11, 21. [Google Scholar] [CrossRef]
- Zoraida, B.S.E.; Indumathi, G. Comparison of software defined networking with traditional networking using NS2 simulator. Int. J. Inf. Technol. Secur. 2023, 15, 3–14. [Google Scholar] [CrossRef]
- Zelmanov, S.S.; Krylov, V.V. Computer simulation of strength testing of an object based on signal shaped resources. Int. J. Inf. Technol. Secur. 2023, 15, 59–68. [Google Scholar] [CrossRef]
- Wang, Y.; Zheng, H.; Ye, Y.; Li, L.; Hu, H.; Zhang, J. Modeling and Analysis of SYN Flooding Attack in Power SCADA System Based on Queuing Theory. In Proceedings of the International Conference on Wireless Communications and Applications (ICWCAPP), Haikou, China, 20–21 August 2022. [Google Scholar]
- Tasho, D.T.; Marin, B.M.; Radostina, P.T.; Alexander, K.A. Generalized nets model of the LPF-algorithm of the crossbar switch node for determining LPF-execution time complexity. In Proceedings of the AIP Conference 2333, 090039 (2021), Sofia, Bulgaria, 7–13 June 2020. [Google Scholar]
- Hensel, S.; Marinov, M.B.; Koch, M.; Arnaudov, D. Evaluation of Deep Learning-Based Neural Network Methods for Cloud Detection and Segmentation. Energies 2021, 14, 6156. [Google Scholar] [CrossRef]
- Tashev, T.D.; Marinov, M.B.; Arnaudov, D.D.; Monov, V.V. Computer simulations for determining of the upper bound of throughput of LPF-algorithm for crossbar switch. In Proceedings of the AIP Conference Proceedings, Técnica, Manabí, 11 January 2022; Volume 2505, p. 080030. [Google Scholar]
- Tashev, T.D.; Alexandrov, A.K.; Arnaudov, D.D.; Tasheva, R.P. Large-Scale Computer Simulation of the Performance of the Generalized Nets Model of the LPF-algorithm. In Large-Scale Scientific Computing; LSSC 2021. Lecture Notes in Computer Science; Lirkov, I., Margenov, S., Eds.; Springer: Cham, Switzerland, 2021; Volume 13127. [Google Scholar]
- Sapundzhi, F.I.; Popstoilov, M.S. Maximum-Flow Problem in Networking. Bulg. Chem. Commun. 2020, 52, 192–196. [Google Scholar]
- Qaid, A.; Ertuğ, Ö. Transition from IPv4 to IPv6 Mechanisms by GNS3 Emulation: YPTC as a Case Study. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021. [Google Scholar]
- Biradar, A.G. A Comparative Study on Routing Protocols: RIP, OSPF and EIGRP and Their Analysis Using GNS-3. In Proceedings of the 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, India, 1–3 December 2020. [Google Scholar]
- Parwani, R.; Al-Amoudi, H.M.S.; Jhummarwala, A. Modeling and Simulating large scale Cyber Effects for Cybersecurity Using Riverbed Modeler. In Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 29–31 January 2020. [Google Scholar]
- Li, F.; Gao, W.; Chen, L.; Liu, W. Modeling and Simulation of Network-on-Chip Routing Algorithm Based on OPNET. In Proceedings of the 2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI), Sanya, China, 4–6 December 2020. [Google Scholar]
- Konshin, S.; Yakubova, M.Z.; Nishanbayev, T.N.; Manankova, O.A. Research and Development of an IP network model based on PBX Asterisk on the Opnet Modeler simulation package. In Proceedings of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Karachi, Pakistan, 8–9 February 2020. [Google Scholar]
- Tas, I.M.; Baktir, S. A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack. Appl. Sci. 2023, 13, 1864. [Google Scholar] [CrossRef]
- Younes, O.; Albalawi, U. Securing Session Initiation Protocol. Sensors 2022, 22, 9103. [Google Scholar] [CrossRef] [PubMed]
- Amalou, W.; Mehdi, M. An Approach to Mitigate DDoS Attacks on SIP Based VoIP. Eng. Proc. 2022, 14, 6. [Google Scholar] [CrossRef]
- Nazih, W.; Elkilani, W.S.; Dhahri, H.; Abdelkader, T. Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks. Electronics 2020, 9, 1827. [Google Scholar] [CrossRef]
- Nazih, W.; Hifny, Y.; Elkilani, W.S.; Dhahri, H.; Abdelkader, T. Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks. Sensors 2020, 20, 5875. [Google Scholar] [CrossRef] [PubMed]
- Armoogum, S.; Mohamudally, N. A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems. Int. J. Comput. Netw. Inf. Secur. 2021, 13, 13–25. [Google Scholar] [CrossRef]
- Jama, A.M.; Khalifa, O.O.; Subramaniam, N.K.; Kumar, N. Novel Approach for IP–PBX Denial of Service Intrusion Detection Using Support Vector Machine Algorithm. Int. J. Commun. Netw. Inf. Secur. 2021, 13, 249–257. [Google Scholar] [CrossRef]
- Younes, O.S. A hybrid deep learning model for detecting DDoS flooding attacks in SIP–based systems. Comput. Netw. 2024, 240, 110146. [Google Scholar] [CrossRef]
- Khan, H.M.A.; Inayat, U.; Zia, M.F.; Ali, F.; Jabeen, T.; Ali, S.M. Voice Over Internet Protocol: Vulnerabilities and Assessments. In Proceedings of the 2021 International Conference on Innovative Computing (ICIC), Lahore, Pakistan, 9–10 November 2021; pp. 1–6. [Google Scholar]
- Tas, I.M.; Baktir, S. Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks. IEEE Access 2024, 12, 60123–60137. [Google Scholar] [CrossRef]
- Çakır, S.; Sertbaş, A.; Aydın, M.A. Machine Learning-Based Security Test Model and Evaluation for SIP-Based DoS Attacks. In Proceedings of the 2022 International Conference on INnovations in Intelligent SysTems and Applications (INISTA), Biarritz, France, 8–12 August 2022; pp. 1–5. [Google Scholar]
- Tas, I.M.; Unsalver, B.G.; Baktir, S. A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism. IEEE Access 2020, 8, 112574–112584. [Google Scholar] [CrossRef]
- Sbai, O.; Allaert, B.; Sondi, P.; Meddahi, A. SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks. In Machine Learning for Networking; MLN 2023. Lecture Notes in Computer Science; Renault, É., Boumerdassi, S., Mühlethaler, P., Eds.; Springer: Cham, Switzerland, 2024; Volume 14525. [Google Scholar] [CrossRef]
- Wang, S.; Li, H.; Song, P.; Xu, L. A SIP-Based Flooding Attack Detection Method in VoIP Environment. In Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering (ICITEE ‘23). Association for Computing Machinery, New York, NY, USA, 26 March 2024; pp. 680–684. [Google Scholar] [CrossRef]
- Choti, C.; Hnoohom, N.; Tritilanunt, S.; Yuenyong, S. Prediction of Intrusion Detection in Voice over Internet Protocol System using Machine Learning. In Proceedings of the 9th International Conference on Computer and Communications Management (ICCCM ‘21). Association for Computing Machinery, New York, NY, USA, 28 October 2021; pp. 149–155. [Google Scholar] [CrossRef]
- Kafke, J.; Viana, T. Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems. Network 2022, 2, 545–567. [Google Scholar] [CrossRef]
- Getting Started with GNS3. Available online: https://docs.gns3.com/docs/ (accessed on 25 May 2024).
- Kali Docs, Official Documentation. Available online: https://www.kali.org/docs/ (accessed on 25 May 2024).
- Wireshark. Available online: https://www.wireshark.org/docs/wsug_html_chunked/ (accessed on 25 May 2024).
- Capsa Free Network Analyzer. Available online: https://www.colasoft.com/capsa-free/ (accessed on 25 May 2024).
- Colasoft Ping Tool. Available online: https://www.colasoft.com/ping_tool/ (accessed on 25 May 2024).
- VMware Workstation pro. Available online: https://www.vmware.com/products/workstation-pro/html.html (accessed on 24 June 2024).
- Windows Technical Documentation for Developers and IT pros. Available online: https://learn.microsoft.com/en-us/windows/ (accessed on 24 June 2024).
- Linphone for Desktop. Available online: https://www.linphone.org/ (accessed on 24 June 2024).
- Tim, S.; Christina, H. End-to-End QoS Network Design: Quality of Service in LANs, WANs, and VPNs. In Part of the Networking Technology Series; Cisco Press: Indianapolis, Indiana, 2004; ISBN-10: 1-58705-176-1. [Google Scholar]
- Cisco-Understanding Delay in Packet Voice Networks, White Paper. Available online: https://www.cisco.com/c/en/us/support/docs/voice/voice-quality/5125-delay-details.html (accessed on 25 May 2024).
- TCP SYN Flood Attack. Available online: https://www.imperva.com/learn/ddos/syn-flood/ (accessed on 25 May 2024).
- What Is an ACK Flood DDoS Attack? Available online: https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/ (accessed on 25 May 2024).
- RST Flood attack. Available online: https://kb.mazebolt.com/knowledgebase/rst-flood/ (accessed on 25 May 2024).
- FIN Flood attack. Available online: https://kb.mazebolt.com/knowledgebase/fin-flood/ (accessed on 25 May 2024).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nedyalkov, I. Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams. Telecom 2024, 5, 556-587. https://doi.org/10.3390/telecom5030029
Nedyalkov I. Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams. Telecom. 2024; 5(3):556-587. https://doi.org/10.3390/telecom5030029
Chicago/Turabian StyleNedyalkov, Ivan. 2024. "Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams" Telecom 5, no. 3: 556-587. https://doi.org/10.3390/telecom5030029
APA StyleNedyalkov, I. (2024). Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams. Telecom, 5(3), 556-587. https://doi.org/10.3390/telecom5030029