Skip to main content
Erschienen in: Neural Computing and Applications 9/2018

21.02.2017 | Original Article

Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats

verfasst von: Manjur Kolhar, Abdalla Alameen, Mujthaba Gulam

Erschienen in: Neural Computing and Applications | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Virtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Drutskoy D, Keller E, Rexford J (2013) Scalable network virtualization in software-defined networks. IEEE Internet Comput 17(2):20–27CrossRef Drutskoy D, Keller E, Rexford J (2013) Scalable network virtualization in software-defined networks. IEEE Internet Comput 17(2):20–27CrossRef
2.
Zurück zum Zitat Barker SK, Shenoy P (2010) Empirical evaluation of latency-sensitive application performance in the cloud. In: Proceedings of the first annual ACM SIGMM conference on multimedia systems. ACM, New York Barker SK, Shenoy P (2010) Empirical evaluation of latency-sensitive application performance in the cloud. In: Proceedings of the first annual ACM SIGMM conference on multimedia systems. ACM, New York
3.
Zurück zum Zitat Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computer 38(5):39–47CrossRef Rosenblum M, Garfinkel T (2005) Virtual machine monitors: current technology and future trends. Computer 38(5):39–47CrossRef
4.
Zurück zum Zitat Salah K, Calero JMA, Zeadally S, Al-Mulla S, Alzaabi M (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11(1):44–53 Salah K, Calero JMA, Zeadally S, Al-Mulla S, Alzaabi M (2013) Using cloud computing to implement a security overlay network. IEEE Secur Priv 11(1):44–53
5.
Zurück zum Zitat Karol M, Krishnan P, Jenny Li J (2004) Using overlay networks to improve VoIP reliability. In: Automated technology for verification and analysis. Springer, Berlin, pp 392–401CrossRef Karol M, Krishnan P, Jenny Li J (2004) Using overlay networks to improve VoIP reliability. In: Automated technology for verification and analysis. Springer, Berlin, pp 392–401CrossRef
6.
Zurück zum Zitat Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005) 1-800-OVERLAYS: using overlay networks to improve VoIP quality. In: Proceedings of the international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 51–56 Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2005) 1-800-OVERLAYS: using overlay networks to improve VoIP quality. In: Proceedings of the international workshop on Network and operating systems support for digital audio and video. ACM, New York, pp 51–56
7.
Zurück zum Zitat Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef
8.
Zurück zum Zitat Bui QD, Jennings A (2009) Relay node selection in large-scale VoIP overlay networks. First international conference on ubiquitous and future networks, 2009 (ICUFN 2009), pp 56, 61 Bui QD, Jennings A (2009) Relay node selection in large-scale VoIP overlay networks. First international conference on ubiquitous and future networks, 2009 (ICUFN 2009), pp 56, 61
9.
Zurück zum Zitat Ssu-Hsuan L, Li K-C, Lai K-C, Chung Y-C (2014) Effectiveness of a replica mechanism to improve availability with arrangement graph-based overlay. J Netw Comput Appl 41:441–450CrossRef Ssu-Hsuan L, Li K-C, Lai K-C, Chung Y-C (2014) Effectiveness of a replica mechanism to improve availability with arrangement graph-based overlay. J Netw Comput Appl 41:441–450CrossRef
10.
Zurück zum Zitat Wei Yu, Chellappan S, Xuan D (2005) P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener Comput Syst 21(1):209–219CrossRef Wei Yu, Chellappan S, Xuan D (2005) P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks. Future Gener Comput Syst 21(1):209–219CrossRef
11.
Zurück zum Zitat Chen H, Hui-Kai S, Cheng B-C (2007) An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks. Comput Commun 30(16):3055–3062CrossRef Chen H, Hui-Kai S, Cheng B-C (2007) An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks. Comput Commun 30(16):3055–3062CrossRef
12.
Zurück zum Zitat McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Oper Syst Rev 44(4):40–56CrossRef McDougall R, Anderson J (2010) Virtualization performance: perspectives and challenges ahead. ACM SIGOPS Oper Syst Rev 44(4):40–56CrossRef
13.
Zurück zum Zitat Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38, 43CrossRef Vieira K, Schulter A, Westphall CB, Westphall CM (2010) Intrusion detection for grid and cloud computing. IT Prof 12(4):38, 43CrossRef
14.
Zurück zum Zitat Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef Amir Y, Danilov C, Goose S, Hedqvist D, Terzis A (2006) An overlay architecture for high-quality VoIP streams. IEEE Trans Multimed 8(6):1250–1262CrossRef
15.
Zurück zum Zitat Duan Z, Zhang Z-L, Hou YT (2003) Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Trans Netw 11(6):870–883CrossRef Duan Z, Zhang Z-L, Hou YT (2003) Service overlay networks: SLAs, QoS, and bandwidth provisioning. IEEE/ACM Trans Netw 11(6):870–883CrossRef
16.
Zurück zum Zitat Mishra PP, Saran H (2000) Capacity management and routing policies for voice over IP traffic. Network, IEEE, vol 14, no 2, pp 20, 27CrossRef Mishra PP, Saran H (2000) Capacity management and routing policies for voice over IP traffic. Network, IEEE, vol 14, no 2, pp 20, 27CrossRef
17.
Zurück zum Zitat Li H, Mason L, Rabbat M (2009) Distributed adaptive diverse routing for voice-over-IP in service overlay networks. IEEE transactions on network and service management, vol 6, no 3, pp 175, 189CrossRef Li H, Mason L, Rabbat M (2009) Distributed adaptive diverse routing for voice-over-IP in service overlay networks. IEEE transactions on network and service management, vol 6, no 3, pp 175, 189CrossRef
18.
Zurück zum Zitat Seedorf J (2006) Security challenges for peer-to-peer SIP. Network, IEEE, vol 20, no 5, pp 38, 45CrossRef Seedorf J (2006) Security challenges for peer-to-peer SIP. Network, IEEE, vol 20, no 5, pp 38, 45CrossRef
19.
Zurück zum Zitat Walsh TJ, Kuhn R (2005) Challenges in securing voice over IP. Security & Privacy, IEEE, vol 3, no 3, pp 44, 49 Walsh TJ, Kuhn R (2005) Challenges in securing voice over IP. Security & Privacy, IEEE, vol 3, no 3, pp 44, 49
20.
Zurück zum Zitat Bouzida Y, Mangin C (2008) A framework for detecting anomalies in VoIP networks. Third international conference on availability, reliability and security, 2008 (ARES 08), pp 204, 211 Bouzida Y, Mangin C (2008) A framework for detecting anomalies in VoIP networks. Third international conference on availability, reliability and security, 2008 (ARES 08), pp 204, 211
21.
Zurück zum Zitat Zhang G, Fischer-Hübner S, Ehlert S (2010) Blocking attacks on SIP VoIP proxies caused by external processing. Telecommun Syst 45(1):61–76CrossRef Zhang G, Fischer-Hübner S, Ehlert S (2010) Blocking attacks on SIP VoIP proxies caused by external processing. Telecommun Syst 45(1):61–76CrossRef
22.
Zurück zum Zitat Gonçalves D, António A, António C, Pedro S (2016) Towards automated test and validation of SIP solutions. Telecommun Syst 61(3):579–590CrossRef Gonçalves D, António A, António C, Pedro S (2016) Towards automated test and validation of SIP solutions. Telecommun Syst 61(3):579–590CrossRef
23.
Zurück zum Zitat Zargar S, James J, David T (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 15(4):2046–2069CrossRef Zargar S, James J, David T (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun Surv Tut 15(4):2046–2069CrossRef
24.
Zurück zum Zitat Thomas P, Michael G (2007) Chapter 9—IETF encryption solutions for VoIP, how to cheat, Syngress, Burlington, 2007. How to cheat at VoIP security, pp 239–251 Thomas P, Michael G (2007) Chapter 9—IETF encryption solutions for VoIP, how to cheat, Syngress, Burlington, 2007. How to cheat at VoIP security, pp 239–251
25.
Zurück zum Zitat Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef Dantu R, Fahmy S, Schulzrinne H, Cangussu J (2009) Issues and challenges in securing VoIP. Comput Secur 28(8):743–753CrossRef
26.
Zurück zum Zitat Keromytis AD (2010) Voice-over-IP security: research and practice. Security & privacy, IEEE, vol 8, no 2, pp 76, 78 Keromytis AD (2010) Voice-over-IP security: research and practice. Security & privacy, IEEE, vol 8, no 2, pp 76, 78
27.
Zurück zum Zitat Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46(8):80–86CrossRef Quittek J, Niccolini S, Tartarelli S, Schlegel R (2008) On spam over internet telephony (SPIT) prevention. IEEE Commun Mag 46(8):80–86CrossRef
29.
Zurück zum Zitat Cisco (2014) Cisco active network abstraction reference guide. Sanfrancisco Cisco (2014) Cisco active network abstraction reference guide. Sanfrancisco
30.
Zurück zum Zitat Voznak M, Rozhon J (2010) SIP infrastructure performance testing. In: Proceedings 9th WSEAS international conference on telecommunications and informatics Voznak M, Rozhon J (2010) SIP infrastructure performance testing. In: Proceedings 9th WSEAS international conference on telecommunications and informatics
31.
Zurück zum Zitat Kimmel JS, Alfieri RA, Miles A, McGrath WK, McLeod MJ, O’connell MA, Simpson GA (2000) Operating system for a non-uniform memory access multiprocessor system. U.S. Patent 6,105,053, issued August 15, 2000 Kimmel JS, Alfieri RA, Miles A, McGrath WK, McLeod MJ, O’connell MA, Simpson GA (2000) Operating system for a non-uniform memory access multiprocessor system. U.S. Patent 6,105,053, issued August 15, 2000
32.
Zurück zum Zitat Lange J, Pedretti K, Hudson T, Dinda P, Cui Z, Xia L, Bridges P et al (2010) Palacios and kitten: new high performance operating systems for scalable virtualized and native supercomputing. In: 2010 IEEE international symposium on, parallel & distributed processing (IPDPS). IEEE, pp 1–12 Lange J, Pedretti K, Hudson T, Dinda P, Cui Z, Xia L, Bridges P et al (2010) Palacios and kitten: new high performance operating systems for scalable virtualized and native supercomputing. In: 2010 IEEE international symposium on, parallel & distributed processing (IPDPS). IEEE, pp 1–12
33.
Zurück zum Zitat Cloudera reference architecture for Microsoft azure deployments, Version CDH 5.3 Cloudera reference architecture for Microsoft azure deployments, Version CDH 5.3
Metadaten
Titel
Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats
verfasst von
Manjur Kolhar
Abdalla Alameen
Mujthaba Gulam
Publikationsdatum
21.02.2017
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 9/2018
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-017-2886-y

Weitere Artikel der Ausgabe 9/2018

Neural Computing and Applications 9/2018 Zur Ausgabe