A New Architecture to Protect SIP Server against Flooding Attack
Session Initiation Protocol (SIP) is coming the most popular used signaling protocol by the Telephony over IP (ToIP) to open, alter, and terminate a multimedia session among various participants. As result of this popularity SIP become new targets of several attacks. Flooding attack is one of those attacks, which is applied to consume server’s resources; in this attack a malicious try to flood its victim with a lot of messages more than it can process in a giving period time. In this paper we propose a new architecture that can protect SIP servers against flooding attack. Our proposed architecture is implemented under JAVA programming language. Then, we have done the experimental tests in Local Area Network, the obtained results prove that the proposed architecture can detect flooding attack as well as it can provide the service even if the attack is detected.
Disclaimer/Regarding indexing issue:
We have provided the online access of all issues and papers to the indexing agencies (as given on journal web site). It’s depend on indexing agencies when, how and what manner they can index or not. Hence, we like to inform that on the basis of earlier indexing, we can’t predict the today or future indexing policy of third party (i.e. indexing agencies) as they have right to discontinue any journal at any time without prior information to the journal. So, please neither sends any question nor expects any answer from us on the behalf of third party i.e. indexing agencies.Hence, we will not issue any certificate or letter for indexing issue. Our role is just to provide the online access to them. So we do properly this and one can visit indexing agencies website to get the authentic information. Also: DOI is paid service which provided by a third party. We never mentioned that we go for this for our any journal. However, journal have no objection if author go directly for this paid DOI service.