Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies

被引:10
作者
Tas, Ismail Melih [1 ]
Ugurdogan, Bahar [2 ]
Baktir, Selcuk [1 ]
机构
[1] Bahcesehir Univ, Dept Comp Engn, Istanbul, Turkey
[2] Bahcesehir Univ, Dept Appl Math, Istanbul, Turkey
关键词
DDoS; Incomplete transaction; IP spoofing; Next generation network; Retransmission; SIP; SIP security; Unified communication; VoIP; VoIP security; FLOODING ATTACK;
D O I
10.1016/j.cose.2016.08.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice-over-IP (VoIP) and its underlying session initiation protocol (SIP) techniques have become popular in recent years. VoIP/SIP techniques are used widely in unified communication systems and next generation networks, and there is no doubt they will play increasingly important roles in the future of communication techniques. However, unlike transmission control protocol (TCP)-based applications, the user datagram protocol (UDP)-basedVoIP/SIP applications are not as mature and they have some security vulnerabilities. Therefore, it is crucial to study VoIP/SIP-related security issues. In this study, we investigated the existing vulnerabilities in the SIP protocol and identify new vulnerabilities in the SIP retransmission mechanisms, which could be exploited by denial-of-service (DoS)/distributed denial-of-service (DDoS) attacks. We prepared a VoIP/SIP security laboratory environment and a DDoS attack simulator. We developed two advanced attacks by exploiting the vulnerabilities identified in the SIP retransmission mechanism and we implemented these attacks in our laboratory environment using the DoS/DDoS attack simulator. Our intelligent attacks could bypass black-lists as well as IP-based rate limiting, packet count-based rate limiting, session/transaction-based rate limiting, and automatic message generation detection systems in the existing state-of-the-art security perimeters, such as firewalls, intrusion detection systems, intrusion prevention systems, and anomaly detection systems. Furthermore, we developed a novel defense mechanism to effectively combat the proposed attacks and we implemented it successfully in our VoIP/SIP security laboratory environment. We showed that our defense mechanism reduced the CPU load of a SIP server under attack from 87% down to 13.6%. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:29 / 44
页数:16
相关论文
共 34 条
[1]  
[Anonymous], 2011, P 2011 P 20 INT C CO
[2]  
Baker F., 2004, 3704 IETF RFC
[3]  
BELLOVIN S, 1996, 1948 IETF RFC
[4]   Session Initiation Protocol Firewall for the IP Multimedia Subsystem Core [J].
Bessis, Thierry ;
Gurbani, Vijay K. ;
Rana, Ashwin .
BELL LABS TECHNICAL JOURNAL, 2011, 15 (04) :169-187
[5]  
Cha H Soo, 2008, IEEE INT C SIGN IM T
[6]  
CHEN EY, 2006, IEEE WORKSH VOIP MAN
[7]  
Crowcroft J, 1999, MORGAN KAUFMANN SERI
[8]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666
[9]  
Duan Z, 2008, IEEE T DEPENDABLE SE, V5
[10]  
Ehlert S, 2008, IEEE INT C INT MON P