Skip to main content
Top
Published in: Neural Computing and Applications 9/2018

21-02-2017 | Original Article

Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats

Authors: Manjur Kolhar, Abdalla Alameen, Mujthaba Gulam

Published in: Neural Computing and Applications | Issue 9/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Virtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Drutskoy D, Keller E, Rexford J (2013) Scalable network virtualization in software-defined networks. IEEE Internet Comput 17(2):20–27CrossRef Drutskoy D, Keller E, Rexford J (2013) Scalable network virtualization in software-defined networks. IEEE Internet Comput 17(2):20–27CrossRef
2.
go back to reference Barker SK, Shenoy P (2010) Empirical evaluation of latency-sensitive application performance in the cloud. In: Proceedings of the first annual ACM SIGMM conference on multimedia systems. ACM, New York Barker SK, Shenoy P (2010) Empirical evaluation of latency-sensitive application performance in the cloud. In: Proceedings of the first annual ACM SIGMM conference on multimedia systems. ACM, New York
3.
go back to reference Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computer 38(5):39–47CrossRef Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computer 38(5):39–47CrossRef
4.
go back to reference Salah K, Calero JMA, Zeadally S, Al-Mulla S, Alzaabi M (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11(1):44–53 Salah K, Calero JMA, Zeadally S, Al-Mulla S, Alzaabi M (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11(1):44–53
5.
go back to reference Karol M, Krishnan P, Jenny Li J (2004) Using overlay networks to improve VoIP reliability. In: Automated technology for verification and analysis. Springer, Berlin, pp 392–401CrossRef Karol M, Krishnan P, Jenny Li J (2004) Using overlay networks to improve VoIP reliability. In: Automated technology for verification and analysis. Springer, Berlin, pp 392–401CrossRef
6.
go back to reference Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005) 1-800-OVERLAYS: using overlay networks to improve VoIP quality. In: Proceedings of the international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 51–56 Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005) 1-800-OVERLAYS: using overlay networks to improve VoIP quality. In: Proceedings of the international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 51–56
7.
go back to reference Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef
8.
go back to reference Bui QD, Jennings A (2009) Relay node selection in large-scale VoIP overlay networks. First international conference on ubiquitous and future networks, 2009 (ICUFN 2009), pp 56, 61 Bui QD, Jennings A (2009) Relay node selection in large-scale VoIP overlay networks. First international conference on ubiquitous and future networks, 2009 (ICUFN 2009), pp 56, 61
9.
go back to reference Ssu-Hsuan L, Li K-C, Lai K-C, Chung Y-C (2014) Effectiveness of a replica mechanism to improve availability with arrangement graph-based overlay. J Netw Comput Appl 41:441–450CrossRef Ssu-Hsuan L, Li K-C, Lai K-C, Chung Y-C (2014) Effectiveness of a replica mechanism to improve availability with arrangement graph-based overlay. J Netw Comput Appl 41:441–450CrossRef
10.
go back to reference Wei Yu, Chellappan S, Xuan D (2005) P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener Comput Syst 21(1):209–219CrossRef Wei Yu, Chellappan S, Xuan D (2005) P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener Comput Syst 21(1):209–219CrossRef
11.
go back to reference Chen H, Hui-Kai S, Cheng B-C (2007) An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks. Comput Commun 30(16):3055–3062CrossRef Chen H, Hui-Kai S, Cheng B-C (2007) An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks. Comput Commun 30(16):3055–3062CrossRef
12.
go back to reference McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Oper Syst Rev 44(4):40–56CrossRef McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Oper Syst Rev 44(4):40–56CrossRef
13.
go back to reference Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38, 43CrossRef Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38, 43CrossRef
14.
go back to reference Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef
15.
go back to reference Duan Z, Zhang Z-L, Hou YT (2003) Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Trans Netw 11(6):870–883CrossRef Duan Z, Zhang Z-L, Hou YT (2003) Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Trans Netw 11(6):870–883CrossRef
16.
go back to reference Mishra PP, Saran H (2000) Capacity management and routing policies for voice over IP traffic. Network, IEEE, vol 14, no 2, pp 20, 27CrossRef Mishra PP, Saran H (2000) Capacity management and routing policies for voice over IP traffic. Network, IEEE, vol 14, no 2, pp 20, 27CrossRef
17.
go back to reference Li H, Mason L, Rabbat M (2009) Distributed adaptive diverse routing for voice-over-IP in service overlay networks. IEEE transactions on network and service management, vol 6, no 3, pp 175, 189CrossRef Li H, Mason L, Rabbat M (2009) Distributed adaptive diverse routing for voice-over-IP in service overlay networks. IEEE transactions on network and service management, vol 6, no 3, pp 175, 189CrossRef
18.
go back to reference Seedorf J (2006) Security challenges for peer-to-peer SIP. Network, IEEE, vol 20, no 5, pp 38, 45CrossRef Seedorf J (2006) Security challenges for peer-to-peer SIP. Network, IEEE, vol 20, no 5, pp 38, 45CrossRef
19.
go back to reference Walsh TJ, Kuhn R (2005) Challenges in securing voice over IP. Security & Privacy, IEEE, vol 3, no 3, pp 44, 49 Walsh TJ, Kuhn R (2005) Challenges in securing voice over IP. Security & Privacy, IEEE, vol 3, no 3, pp 44, 49
20.
go back to reference Bouzida Y, Mangin C (2008) A framework for detecting anomalies in VoIP networks. Third international conference on availability, reliability and security, 2008 (ARES 08), pp 204, 211 Bouzida Y, Mangin C (2008) A framework for detecting anomalies in VoIP networks. Third international conference on availability, reliability and security, 2008 (ARES 08), pp 204, 211
21.
go back to reference Zhang G, Fischer-Hübner S, Ehlert S (2010) Blocking attacks on SIP VoIP proxies caused by external processing. Telecommun Syst 45(1):61–76CrossRef Zhang G, Fischer-Hübner S, Ehlert S (2010) Blocking attacks on SIP VoIP proxies caused by external processing. Telecommun Syst 45(1):61–76CrossRef
22.
go back to reference Gonçalves D, António A, António C, Pedro S (2016) Towards automated test and validation of SIP solutions. Telecommun Syst 61(3):579–590CrossRef Gonçalves D, António A, António C, Pedro S (2016) Towards automated test and validation of SIP solutions. Telecommun Syst 61(3):579–590CrossRef
23.
go back to reference Zargar S, James J, David T (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 15(4):2046–2069CrossRef Zargar S, James J, David T (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 15(4):2046–2069CrossRef
24.
go back to reference Thomas P, Michael G (2007) Chapter 9—IETF encryption solutions for VoIP, how to cheat, Syngress, Burlington, 2007. How to cheat at VoIP security, pp 239–251 Thomas P, Michael G (2007) Chapter 9—IETF encryption solutions for VoIP, how to cheat, Syngress, Burlington, 2007. How to cheat at VoIP security, pp 239–251
25.
go back to reference Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef
26.
go back to reference Keromytis AD (2010) Voice-over-IP security: research and practice. Security & privacy, IEEE, vol 8, no 2, pp 76, 78 Keromytis AD (2010) Voice-over-IP security: research and practice. Security & privacy, IEEE, vol 8, no 2, pp 76, 78
27.
go back to reference Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46(8):80–86CrossRef Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46(8):80–86CrossRef
29.
go back to reference Cisco (2014) Cisco active network abstraction reference guide. Sanfrancisco Cisco (2014) Cisco active network abstraction reference guide. Sanfrancisco
30.
go back to reference Voznak M, Rozhon J (2010) SIP infrastructure performance testing. In: Proceedings 9th WSEAS international conference on telecommunications and informatics Voznak M, Rozhon J (2010) SIP infrastructure performance testing. In: Proceedings 9th WSEAS international conference on telecommunications and informatics
31.
go back to reference Kimmel JS, Alfieri RA, Miles A, McGrath WK, McLeod MJ, O’connell MA, Simpson GA (2000) Operating system for a non-uniform memory access multiprocessor system. U.S. Patent 6,105,053, issued August 15, 2000 Kimmel JS, Alfieri RA, Miles A, McGrath WK, McLeod MJ, O’connell MA, Simpson GA (2000) Operating system for a non-uniform memory access multiprocessor system. U.S. Patent 6,105,053, issued August 15, 2000
32.
go back to reference Lange J, Pedretti K, Hudson T, Dinda P, Cui Z, Xia L, Bridges P et al (2010) Palacios and kitten: new high performance operating systems for scalable virtualized and native supercomputing. In: 2010 IEEE international symposium on, parallel & distributed processing (IPDPS). IEEE, pp 1–12 Lange J, Pedretti K, Hudson T, Dinda P, Cui Z, Xia L, Bridges P et al (2010) Palacios and kitten: new high performance operating systems for scalable virtualized and native supercomputing. In: 2010 IEEE international symposium on, parallel & distributed processing (IPDPS). IEEE, pp 1–12
33.
go back to reference Cloudera reference architecture for Microsoft azure deployments, Version CDH 5.3 Cloudera reference architecture for Microsoft azure deployments, Version CDH 5.3
Metadata
Title
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats
Authors
Manjur Kolhar
Abdalla Alameen
Mujthaba Gulam
Publication date
21-02-2017
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 9/2018
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-017-2886-y

Other articles of this Issue 9/2018

Neural Computing and Applications 9/2018 Go to the issue

Premium Partner