A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks

被引:0
作者
Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand [1 ]
机构
[1] Department of Computer Science and Software Engineering, University of Canterbury, Christchurch
来源
Int. J. Internet Protoc. Technol. | 2008年 / 2卷 / 128-135期
关键词
Digest authentication; Iptables; SIP; Stateful and stateless connection; VoIP flooding attack;
D O I
10.1504/IJIPT.2008.020470
中图分类号
学科分类号
摘要
This paper proposes a novel method to address the protection necessary to mitigate flooding attacks in VoIP networks which can produce rapid saturation of a firewall and crippling of a VoIP switch. The paper proposes a stateless firewall nonce checking mechanism as an extension to the existing (stateful) SIP digest authentication. This combination aims to form a more secure and flood-resistant authentication scheme for SIP-based VoIP systems. The proposed mechanism has been implemented on a Linux iptables firewall and the experimental results demonstrate proof-of-concept showing that by incorporating this mechanism it is possible to provide substantially improved SIP-based flooding mitigation. Copyright © 2008, Inderscience Publishers.
引用
收藏
页码:128 / 135
页数:7
相关论文
共 44 条
  • [41] Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks
    Tas, I. Melih
    Baktir, Selcuk
    IEEE ACCESS, 2024, 12 : 60123 - 60137
  • [42] The Research and Design of a VoIP Teleconference based on P2P-SIP
    Nie, Pengpeng
    Wang, Nan
    Lu, Jiande
    Hu, Ping
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 213 - 218
  • [43] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks
    Armoogum, Sheeba
    Mohamudally, Nawaz
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [44] Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints
    Dassouki, Khaled
    Safa, Haidar
    Nassar, Mohamed
    Hijazi, Abbas
    COMPUTERS & SECURITY, 2017, 70 : 618 - 633