Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats

Virtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions.

[1]  Hong Li,et al.  Distributed adaptive diverse routing for voice-over-IP in service overlay networks , 2009, IEEE Transactions on Network and Service Management.

[2]  Pedro Sousa,et al.  Towards automated test and validation of SIP solutions , 2015, Telecommunication Systems.

[3]  Andrew Jennings,et al.  Relay node selection in large-scale VoIP overlay networks , 2009, 2009 First International Conference on Ubiquitous and Future Networks.

[4]  Miroslav Voznak,et al.  SIP infrastructure performance testing , 2010, ICT 2010.

[5]  Jürgen Quittek,et al.  On Spam over Internet Telephony (SPIT) Prevention , 2008, IEEE Communications Magazine.

[6]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[7]  Andreas Terzis,et al.  An Overlay Architecture for High-Quality VoIP Streams , 2006, IEEE Transactions on Multimedia.

[8]  Ge Zhang,et al.  Blocking attacks on SIP VoIP proxies caused by external processing , 2010, Telecommun. Syst..

[9]  Prashant J. Shenoy,et al.  Empirical evaluation of latency-sensitive application performance in the cloud , 2010, MMSys '10.

[10]  Yacine Bouzida,et al.  A Framework for Detecting Anomalies in VoIP Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[11]  Jennifer Rexford,et al.  Scalable Network Virtualization in Software-Defined Networks , 2013, IEEE Internet Computing.

[12]  Thomas Porter,et al.  Chapter 9 – IETF Encryption Solutions for VoIP , 2007 .

[13]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[14]  Parameshwaran Krishnan,et al.  Using Overlay Networks to Improve VoIP Reliability , 2004, ATVA.

[15]  Tal Garfinkel,et al.  Virtual machine monitors: current technology and future trends , 2005, Computer.

[16]  Angelos D. Keromytis,et al.  Voice-over-IP Security: Research and Practice , 2010, IEEE Security & Privacy.

[17]  Yeh-Ching Chung,et al.  Effectiveness of a replica mechanism to improve availability with Arrangement Graph-Based Overlay , 2014, J. Netw. Comput. Appl..

[18]  Richard McDougall,et al.  Virtualization performance: perspectives and challenges ahead , 2010, OPSR.

[19]  D. Richard Kuhn,et al.  Challenges in securing voice over IP , 2005, IEEE Security & Privacy Magazine.

[20]  Bo-Chao Cheng,et al.  An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks , 2007, Comput. Commun..

[21]  Andreas Terzis,et al.  1-800-OVERLAYS: using overlay networks to improve VoIP quality , 2005, NOSSDAV '05.

[22]  Jan Seedorf Security challenges for peer-to-peer SIP , 2006, IEEE Network.

[23]  Henning Schulzrinne,et al.  Issues and challenges in securing VoIP , 2009, Comput. Secur..

[24]  Sherali Zeadally,et al.  Using Cloud Computing to Implement a Security Overlay Network , 2013, IEEE Security & Privacy.

[25]  Yiwei Thomas Hou,et al.  Service overlay networks: SLAs, QoS, and bandwidth provisioning , 2003, TNET.

[26]  Peter A. Dinda,et al.  Palacios and Kitten: New high performance operating systems for scalable virtualized and native supercomputing , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).

[27]  Dong Xuan,et al.  P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks , 2005, Future Gener. Comput. Syst..

[28]  Huzur Saran,et al.  Capacity management and routing policies for voice over IP traffic , 2000 .