On securing RTP-based streaming content with firewalls

被引:0
作者
Lu, L [1 ]
Safavi-Naini, R [1 ]
Horton, J [1 ]
Susilo, W [1 ]
机构
[1] Univ Wollongong, Sch Informat Technol & Comp Sci, Ctr Commun Secur Res, Wollongong, NSW, Australia
来源
CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS | 2005年 / 3810卷
关键词
network security; firewall; streaming content;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Delivery of real-time streaming content is an increasingly important Internet application. Applications involved in processing streaming content may have exploitable vulnerabilities, as many other applications have been discovered to have, and using a firewall to filter out malicious traffic may provide some benefit. However, as these applications largely rely on traffic carried by RTP/UDP, firewalls that are unaware of the behaviour of RTP data streams have difficulties in filtering out malicious traffic injected into a stream by an attacker. In this paper, we observe a vulnerability in the current RTP protocol which allows an attacker to inject malicious traffic into a data stream, and present a scheme that allows a stateful firewall that keeps state from RTP packets to detect such malicious traffic. Our technique uses non-static fields such as RTP sequence numbers to improve the inspection scheme by modelling streaming traffic and detecting malicious streams based on deviation for this model. We show effectiveness of our approach by giving the results of our experiments.
引用
收藏
页码:304 / 319
页数:16
相关论文
共 23 条
[1]  
[Anonymous], 1999, APPL MULTIVARIATE AN
[2]  
BACHER D, 3 PARTY RTCP MONITOR
[3]  
*BROOKTR TECHN, 2004, SNOWSHORE MED FIR TE
[4]  
Cheswick WilliamR., 1994, FIREWALLS INTERNET S
[5]  
*CISC IOS FIR, 2005, TECHN REP CISC SYST
[6]  
Danzig P. B., 1992, Internetworking: Research and Experience, V3, P1
[7]   LOCAL AREA NETWORK TRAFFIC CHARACTERISTICS, WITH IMPLICATIONS FOR BROAD-BAND NETWORK CONGESTION MANAGEMENT [J].
FOWLER, HJ ;
LELAND, WE .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1991, 9 (07) :1139-1149
[8]   TRAFFIC MODELING FOR TELECOMMUNICATIONS NETWORKS [J].
FROST, VS ;
MELAMED, B .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (03) :70-81
[9]  
FUNG KP, 1999, THESIS HONG KONG POL
[10]  
FUNG KP, 2004, ICIP, V3, P1763