RETROSPECTIVE ANALYSIS OF METHODS FOR DETECTING DOS ATTACKS IN VOIP SYSTEMS
Abstract and keywords
Abstract (English):
The article is devoted to the problem of detecting DoS attacks on a VoIP system. To this end, a retrospective analysis of the relevant methods is carried out, namely the following five, namely the following five: manual administration, expert rules, statistical rules, the use of signatures and artificial intelligence technologies. The ideas of the methods are described, their flowcharts are given, examples of work are given, and their overall effectiveness is assessed. To compare methods, the following criteria are highlighted: detection accuracy, response accuracy, preparation time, response time, human resource efficiency, hardware and software resource efficiency, intelligence, ease of implementation. Based on the criterion comparison, fundamental conclusions were drawn regarding the methods and their development. Conclusions are drawn regarding ways to continue the research.

Keywords:
VoIP system, DoS attacks, detection, methods, retrospective analysis, criterion comparison
Text
Text (PDF): Read Download
References

1. Izrailov K.E., Makarova A.K., Shestakov A.V. Generalized model of protection against cyberattacks on VOIP // Cybersecurity Issues. - 2023. - No. 2 (54). - P. 109-121. - DOI 10.21681 / 2311-3456-2023-2-109-121. - EDN KIMEAW.

2. Makarova A.K., Polyanicheva A.V., Samatova K.A. Analysis of vulnerabilities of voice traffic transmission equipment // Actual problems of infotelecommunications in science and education (APINO 2022): collection of articles of the XI International Scientific, Technical and Scientific-Methodological Conference (St. Petersburg, February 15-16, 2022). – Volume 1. – Saint Petersburg: Saint Petersburg State University of Telecommunications named after prof. M.A. Bonch-Bruevich, 2022. – P. 665-669. – EDN JRKJAR.

3. Dzhinevan Sh. Administration on the move // Networks and communication systems. – 2007. – No. 14. – P. 43-52. – EDN ILJELV.

4. Khomenko A.D. Coordination of expert assessments with fuzzy inference in an intrusion detection system // Problems of information security. Computer systems. – 2009. – No. 4. – P. 42-50. – EDN LDGKYP.

5. Ternovoy O.S. Early detection of DDoS attacks based on statistical analysis // Prospects for the development of information technology. – 2011. – No. 6. – P. 212-215. – EDN RPDHNT.

6. Borisov V.I., Shaburov A.S. On the application of signature methods of information analysis in SIEM systems // Bulletin of the Ural Federal District. Security in the information sphere. - 2015. - No. 3 (17). - P. 23-27. - EDN VIYWEZ.

7. Tokarev S.A. Study of artificial intelligence algorithms for detecting network attacks // International Journal of Professional Science. - 2023. - No. 6. - P. 177-182. - EDN TKYRXE.

8. Orlov G.A., Krasov A.V., Gelfand A.M. Application of Big Data in the analysis of big data in computer networks // Science-intensive technologies in space research of the Earth. - 2020. - Vol. 12, No. 4. - P. 76-84. – DOIhttps://doi.org/10.36724/2409-5419-2020-12-4-76-84. – EDN RQQTOQ.

9. Krasov AV, Gelfand AM, Korzhik VI Building a trusted computing environment [et al.]. – SPb: Individual entrepreneur Petriv Roman Bogdanovich, 2019. – 108 p. – ISBN 978-5-6043143-2-6. – EDN RECXBI.

10. Dushin S.E., Krasov AV, Kuzmin NN, Yakovlev VB Synthesis of structurally complex nonlinear control systems: Systems with polynomial nonlinearities. – SPb: St. Petersburg Electrotechnical University "LETI" named after V.I. Ulyanova (Lenina), 2004. – 371 p.

11. Branitsky A.A. Combined approach to detecting network attacks based on signature analysis and computational intelligence methods // Regional informatics "RI-2016": Conference materials, St. Petersburg, October 26–28, 2016. – St. Petersburg: Politechnika-print, 2016. – P. 150. – EDN OTYTAX.

Login or Create
* Forgot password?