Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880636
J. Mtsweni, L. Burge
Unemployment is one of the main hindrances to socio-economic development in developing nations. At the same time, the prominent adoption and use of digital technologies, especially mobile devices have changed the status quo in Africa with regard to digital divide, communication, and information access. Nevertheless, most parts of Africa and other developing countries are still lagging behind when it comes to the swiftness of implementing technologies that have the potential of addressing pressing issues such as unemployment. On-demand mobile microwork services, which are a subset of the crowdsourcing paradigm, are some of the initiatives that are under-explored, particularly for dealing with issues of unemployment. This research paper explores the potential benefits of such services as one possible contribution for dealing with joblessness in developing nations where mobile devices are easily accessible and used. Furthermore, the paper presents some of the pertinent research opportunities and challenges that need to be considered when dealing with mobile microwork services.
{"title":"The potential benefits of mobile microwork services in developing nations: Research opportunities and challenges","authors":"J. Mtsweni, L. Burge","doi":"10.1109/ISTAFRICA.2014.6880636","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880636","url":null,"abstract":"Unemployment is one of the main hindrances to socio-economic development in developing nations. At the same time, the prominent adoption and use of digital technologies, especially mobile devices have changed the status quo in Africa with regard to digital divide, communication, and information access. Nevertheless, most parts of Africa and other developing countries are still lagging behind when it comes to the swiftness of implementing technologies that have the potential of addressing pressing issues such as unemployment. On-demand mobile microwork services, which are a subset of the crowdsourcing paradigm, are some of the initiatives that are under-explored, particularly for dealing with issues of unemployment. This research paper explores the potential benefits of such services as one possible contribution for dealing with joblessness in developing nations where mobile devices are easily accessible and used. Furthermore, the paper presents some of the pertinent research opportunities and challenges that need to be considered when dealing with mobile microwork services.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123806242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880605
Ian Ellefsen
The development of cyber security policies is an area of keen worldwide interest. Many countries are actively creating cyber security policies to manage their critical information infrastructures and their critical systems. Many developed countries have created comprehensive cyber security policies aimed at establishing effective national cyber security structures and international partnerships. Developing countries are also in the process of creating their own cyber security policies and frameworks, and these countries are in the position where they can harness the lessons learnt in developed regions. In this paper we will outline and discuss the developing cyber security policy framework in South Africa as an example of cyber security policy developments occurring in developing regions and the implications on SMMEs as a component of the resulting protection structures.
{"title":"The development of a cyber security policy in developing regions and the impact on stakeholders","authors":"Ian Ellefsen","doi":"10.1109/ISTAFRICA.2014.6880605","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880605","url":null,"abstract":"The development of cyber security policies is an area of keen worldwide interest. Many countries are actively creating cyber security policies to manage their critical information infrastructures and their critical systems. Many developed countries have created comprehensive cyber security policies aimed at establishing effective national cyber security structures and international partnerships. Developing countries are also in the process of creating their own cyber security policies and frameworks, and these countries are in the position where they can harness the lessons learnt in developed regions. In this paper we will outline and discuss the developing cyber security policy framework in South Africa as an example of cyber security policy developments occurring in developing regions and the implications on SMMEs as a component of the resulting protection structures.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125089271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880612
M. Calado, Luís Antunes, Ana Ramos
Very often, public policies can only be evaluated after they have been implemented and deployed. The prior simulation of these policies can ensure several benefits: the design can be more accurately adjusted to the objectives of the policy makers; the policies can better reflect the motivations of the individuals involved in several roles (in the case of health services: users, doctors, nurses, civil servants, auditors, policy makers); the micro-macro connections and mediations are represented explicitly; the simulation may allow the successive improvement of the policies; the decision makers and stakeholders may get to know the territory of decision in such a way to better respond in contingency situations. We propose multi-agent-based simulation as a form of orienting the specification of policies. The multi-agent systems allow for the representation of heterogeneous rational agents and provide an approach to create complex dynamic models of social phenomena. This paper describes how we can tackle the problem of optimization of the policies of medical emergency services, in the case when there is a clear distinction between the design of these policies and the use that people give them. We present the scenario and a model for the simulation, identifying the actors involved, the connections and relationships between them, the measures needed to evaluate the multi-dimensional results of the simulation and how the policies can be fine-tuned and simulated before they are deployed in the real world.
{"title":"Social simulation for optimization of emergency health services policy","authors":"M. Calado, Luís Antunes, Ana Ramos","doi":"10.1109/ISTAFRICA.2014.6880612","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880612","url":null,"abstract":"Very often, public policies can only be evaluated after they have been implemented and deployed. The prior simulation of these policies can ensure several benefits: the design can be more accurately adjusted to the objectives of the policy makers; the policies can better reflect the motivations of the individuals involved in several roles (in the case of health services: users, doctors, nurses, civil servants, auditors, policy makers); the micro-macro connections and mediations are represented explicitly; the simulation may allow the successive improvement of the policies; the decision makers and stakeholders may get to know the territory of decision in such a way to better respond in contingency situations. We propose multi-agent-based simulation as a form of orienting the specification of policies. The multi-agent systems allow for the representation of heterogeneous rational agents and provide an approach to create complex dynamic models of social phenomena. This paper describes how we can tackle the problem of optimization of the policies of medical emergency services, in the case when there is a clear distinction between the design of these policies and the use that people give them. We present the scenario and a model for the simulation, identifying the actors involved, the connections and relationships between them, the measures needed to evaluate the multi-dimensional results of the simulation and how the policies can be fine-tuned and simulated before they are deployed in the real world.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"41 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120923429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880614
Paul M. Okanda, J. Kanyaru
While it might deceptively appear that the major issues in medication concern medicine prescription calculations and the subtleness of conversions between measuring units, research in healthcare shows that the key issues relate to the context in which medication is prescribed. For instance, calculation of dose for the elderly is particularly sensitive especially in cases of repeat prescriptions whereby monitoring is crucial to avoid misuse. Initial (UK-based) primary research among four primary care surgeries and interviews with paediatricians indicated the lack of custom functions within existing information systems in a way that exploits knowledge about drugs, past prescriptions and patients' medical history. This paper presents the research we carried out towards addressing these issues. In particular, the paper presents a prototype software system developed that illustrates the efficacy of addressing medicine calculation issues where contextual information about drug, illness, and patient history are used to reliably inform the prescription process.
{"title":"SmartPrescription: A principled approach towards eliminating prescription errors in healthcare","authors":"Paul M. Okanda, J. Kanyaru","doi":"10.1109/ISTAFRICA.2014.6880614","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880614","url":null,"abstract":"While it might deceptively appear that the major issues in medication concern medicine prescription calculations and the subtleness of conversions between measuring units, research in healthcare shows that the key issues relate to the context in which medication is prescribed. For instance, calculation of dose for the elderly is particularly sensitive especially in cases of repeat prescriptions whereby monitoring is crucial to avoid misuse. Initial (UK-based) primary research among four primary care surgeries and interviews with paediatricians indicated the lack of custom functions within existing information systems in a way that exploits knowledge about drugs, past prescriptions and patients' medical history. This paper presents the research we carried out towards addressing these issues. In particular, the paper presents a prototype software system developed that illustrates the efficacy of addressing medicine calculation issues where contextual information about drug, illness, and patient history are used to reliably inform the prescription process.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880604
G. Mosweunyane, L. Carr
A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository publishing method that aims to counteract this problem. The users' document collections on the desktop are presented in a dynamic, similarity-based interface, allowing them to find, associate and select documents, which can then be uploaded with their exiting metadata to the institutional repository with minimal effort on the part of the user. The demonstration showcases a time and effort-saving method for depositing an item or a set of associated items with metadata to the repository. Adoption of the demonstrated method requires further research in provision of the integration interface and user acceptance.
{"title":"Direct desktop-repository deposits with SWORD","authors":"G. Mosweunyane, L. Carr","doi":"10.1109/ISTAFRICA.2014.6880604","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880604","url":null,"abstract":"A repository is an institutional-scale collection, which feeds off individuals' document collections. Repositories provide interfaces for users to deposit items, and this involves uploading the document and filling-in the metadata. These interfaces have been criticised for requiring time and effort on the part of the user, especially with the filling-in of the metadata. This paper presents a repository publishing method that aims to counteract this problem. The users' document collections on the desktop are presented in a dynamic, similarity-based interface, allowing them to find, associate and select documents, which can then be uploaded with their exiting metadata to the institutional repository with minimal effort on the part of the user. The demonstration showcases a time and effort-saving method for depositing an item or a set of associated items with metadata to the repository. Adoption of the demonstrated method requires further research in provision of the integration interface and user acceptance.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127285140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880599
T. C. Chakabuda, Lisa F. Seymour, Francois I. Van Der Merwe
As organisations become more process oriented, there has been a significant increase in the demand for graduates and professionals with Business Process Management (BPM) expertise. Whilst there is an increase in BPM training and university related courses to try and address the demand for BPM expertise it has remained a constant challenge for organisations to acquire the appropriate skill set. Little research has been conducted to measure the extent to which graduates meet employer requirements within this field. The aim of this paper is assess the competency gaps of IS students employed in the emerging business process analyst role using the framework for business process analyst competencies as developed by Sonteya and Seymour. We find that competency gaps do exist, the greatest of which were organisation knowledge and the business process orchestration competency. Additionally, the study found that employers consider the business interpersonal competency as the most important for a business process analyst role.
{"title":"Uncovering the competency gap of students employed in business process analyst roles — An employer perspective","authors":"T. C. Chakabuda, Lisa F. Seymour, Francois I. Van Der Merwe","doi":"10.1109/ISTAFRICA.2014.6880599","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880599","url":null,"abstract":"As organisations become more process oriented, there has been a significant increase in the demand for graduates and professionals with Business Process Management (BPM) expertise. Whilst there is an increase in BPM training and university related courses to try and address the demand for BPM expertise it has remained a constant challenge for organisations to acquire the appropriate skill set. Little research has been conducted to measure the extent to which graduates meet employer requirements within this field. The aim of this paper is assess the competency gaps of IS students employed in the emerging business process analyst role using the framework for business process analyst competencies as developed by Sonteya and Seymour. We find that competency gaps do exist, the greatest of which were organisation knowledge and the business process orchestration competency. Additionally, the study found that employers consider the business interpersonal competency as the most important for a business process analyst role.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129132188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880617
P. K. Mashoko Nkwari, S. Rimer, B. Paul
Stock theft is a major problem in the agricultural sector in South Africa and threatens both commercial and the emerging farming sectors in most of the country. Although there have been several techniques to identify cattle and combat stock theft, the scourge has not been eradicated in the farming sector. This paper investigates how we can model cow behaviour using global positioning wireless nodes to get the expected position of a cow. The objective of this research is to model the typical behaviour of a cow to determine anomalies in behaviour that could indicate the presence of the thieves. A wireless sensor node was designed to sense the position and speed of a cow. The position and the speed of the cow are collected for analysis. A random walk model is applied to the cow's position in order to determine the probability of the boundary condition where we assume there is an increased probability of a cow on the boundary position being stolen. The Continuous Time Markov Processes (CTMP) is applied to the movement pattern of an individual cow in order to find the probability that the cow will be at the boundary position. The value of 2.5 km/h has been found as our treshold to detect any agitation of the animal. The cow has less probability to be at the boundary position. The predictive model allows us to prevent stock theft in farms especially in South Africa and Africa in general.
{"title":"Cattle monitoring system using wireless sensor network in order to prevent cattle rustling","authors":"P. K. Mashoko Nkwari, S. Rimer, B. Paul","doi":"10.1109/ISTAFRICA.2014.6880617","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880617","url":null,"abstract":"Stock theft is a major problem in the agricultural sector in South Africa and threatens both commercial and the emerging farming sectors in most of the country. Although there have been several techniques to identify cattle and combat stock theft, the scourge has not been eradicated in the farming sector. This paper investigates how we can model cow behaviour using global positioning wireless nodes to get the expected position of a cow. The objective of this research is to model the typical behaviour of a cow to determine anomalies in behaviour that could indicate the presence of the thieves. A wireless sensor node was designed to sense the position and speed of a cow. The position and the speed of the cow are collected for analysis. A random walk model is applied to the cow's position in order to determine the probability of the boundary condition where we assume there is an increased probability of a cow on the boundary position being stolen. The Continuous Time Markov Processes (CTMP) is applied to the movement pattern of an individual cow in order to find the probability that the cow will be at the boundary position. The value of 2.5 km/h has been found as our treshold to detect any agitation of the animal. The cow has less probability to be at the boundary position. The predictive model allows us to prevent stock theft in farms especially in South Africa and Africa in general.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115276491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880619
Yohannes Derbew, M. Libsie
Design and implementation of Wireless Sensor Networks (WSNs) is a challenging task because WSN research is usually application specific and each application requirement brings with it a different set of constraints and design objectives. Effective use of WSNs in large scale and long-term monitoring of industrial water pollution requires satisfying two inherently contradicting requirements particular to this domain. On the one hand, it has to be time critical in order to provide early warning during compliance violations. On the other hand, it requires long-term data collection from a large number of distributed industrial sites for trend analysis for decision-making. We present the design of a comprehensive framework for using WSNs in industrial water pollution monitoring to assist environment authorities in decision-making regarding water pollution. The suitability and effectiveness of our proposed framework is verified with an experiment using the discrete-event simulator Castalia based on the OMNeT++ simulation platform.
{"title":"A wireless sensor network framework for large-scale industrial water pollution monitoring","authors":"Yohannes Derbew, M. Libsie","doi":"10.1109/ISTAFRICA.2014.6880619","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880619","url":null,"abstract":"Design and implementation of Wireless Sensor Networks (WSNs) is a challenging task because WSN research is usually application specific and each application requirement brings with it a different set of constraints and design objectives. Effective use of WSNs in large scale and long-term monitoring of industrial water pollution requires satisfying two inherently contradicting requirements particular to this domain. On the one hand, it has to be time critical in order to provide early warning during compliance violations. On the other hand, it requires long-term data collection from a large number of distributed industrial sites for trend analysis for decision-making. We present the design of a comprehensive framework for using WSNs in industrial water pollution monitoring to assist environment authorities in decision-making regarding water pollution. The suitability and effectiveness of our proposed framework is verified with an experiment using the discrete-event simulator Castalia based on the OMNeT++ simulation platform.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880638
Tabitha Kihara, D. Gichoya
The emerging cloud computing technology provides a compelling prospect for Institutions of Higher Learning to outsource their Information and Communications Technology (ICT). Although its reputation is escalating quickly, there are concerns that must be taken into account. The goal of this paper is to explore the potential of cloud computing in transforming and automating the operations of Higher Learning Institutions in Kenya, both public and private. Cloud computing technology offers many opportunities such disaster recovery, business continuity, data consolidation, availability, confidentiality and data integrity. This paper investigates the significant issues related to the Strengths, Weaknesses, Opportunities and Threats (SWOT) of cloud computing adoption in Institutions of Higher Learning for hosting their e-learning resources, e-library services and digital repositories. The paper adopts a SWOT analysis to assess the implementation level of this technology and presents a framework for adoption and realization of this technology in institutions of higher learning in Kenya. The impact of this paper can be seen in two folds; academic and practice. Its findings add to the body of knowledge in the area of cloud computing. Promotion and adoption of this technology by these institutions is of dire need to policy makers and regulators such as Communication Commission of Kenya (CCK), other stakeholders such as the government, service providers like Kenya Education Network (KENET), industry and research institutions.
{"title":"Use of cloud computing platform for e-learning in institutions of higher learning in Kenya","authors":"Tabitha Kihara, D. Gichoya","doi":"10.1109/ISTAFRICA.2014.6880638","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880638","url":null,"abstract":"The emerging cloud computing technology provides a compelling prospect for Institutions of Higher Learning to outsource their Information and Communications Technology (ICT). Although its reputation is escalating quickly, there are concerns that must be taken into account. The goal of this paper is to explore the potential of cloud computing in transforming and automating the operations of Higher Learning Institutions in Kenya, both public and private. Cloud computing technology offers many opportunities such disaster recovery, business continuity, data consolidation, availability, confidentiality and data integrity. This paper investigates the significant issues related to the Strengths, Weaknesses, Opportunities and Threats (SWOT) of cloud computing adoption in Institutions of Higher Learning for hosting their e-learning resources, e-library services and digital repositories. The paper adopts a SWOT analysis to assess the implementation level of this technology and presents a framework for adoption and realization of this technology in institutions of higher learning in Kenya. The impact of this paper can be seen in two folds; academic and practice. Its findings add to the body of knowledge in the area of cloud computing. Promotion and adoption of this technology by these institutions is of dire need to policy makers and regulators such as Communication Commission of Kenya (CCK), other stakeholders such as the government, service providers like Kenya Education Network (KENET), industry and research institutions.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132167188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-07DOI: 10.1109/ISTAFRICA.2014.6880664
Sheeba Armoogum, N. Mohamudally
Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.
{"title":"Survey of practical security frameworks for defending SIP based VoIP systems against DoS/DDoS attacks","authors":"Sheeba Armoogum, N. Mohamudally","doi":"10.1109/ISTAFRICA.2014.6880664","DOIUrl":"https://doi.org/10.1109/ISTAFRICA.2014.6880664","url":null,"abstract":"Since its existence for the past ten years, the SIP-based Voice Over IP (VoIP) network is playing a key role in the current and future communication by utilising the existing broadband Internet access. Unfortunately, Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks can inflict harmful threats to various nodes (SIP proxy servers, User agents, etc) and may cause failure to the SIP system. This is one reason why over 40 proposals, addressing these problems, have been published. Regrettably, not many of these researchers have considered scalability, extensibility and other performance issues by testing their promising prevention techniques in a real network. We find that there are around eight practical frameworks and the aim of this paper is to revisit these countermeasures solutions. We propose a new way of evaluation criteria and a comparative study of the researchers' ideas are being addressed based on the models (if any) used, the network architectures and the results. We however do not judge any of these proposals; instead we give hints on how the attacks on VoIP networks could be further addressed.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127606758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}