Anomaly-based DoS detection and prevention in SIP networks by modeling SIP normal traffic

被引:2
作者
Hosseinpour, Mahsa [1 ]
Yaghmaee, Mohammad Hossein [1 ]
Seno, Seyed Amin Hosseini [1 ]
Roshkhari, Hossein Khosravi [1 ]
Asadi, Mohsen [1 ]
机构
[1] FUM, Dept Comp Engn, Mashhad, Iran
关键词
VoIP network; SIP security; DoS attacks; finite state machine (FSM); VOIP; SECURITY; ATTACKS; PROTOCOL; DEFENSE;
D O I
10.1002/dac.3825
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the various features of Voice over Internet Protocol (VoIP), this technology has attracted the attention of many users in comparison with the traditional telephony system. However, with the growth of this technology, the security issues and protection of its users against different kinds of threats have been raised as an essential requirement. Session Initiation Protocol is a predominant protocol to initiate and terminate multimedia sessions in VoIP networks that provide simplicity and text-based features. Despite its mentioned advantages, these features impose several vulnerabilities on VoIP networks. Denial of Service attack, as one of the most common attacks against VoIP networks, is also a noted security issue in the Internet Protocol platforms. In such attacks, the attacker tries to prevent service from authorized users by consuming server resources. These attacks can be launched by sending out-of-sequence messages, malformed messages, and flooding different kinds of messages. In this study, a new anomaly-based method is presented for detection and prevention of these attacks. Normal traffic of a VoIP network is modeled by making a finite state machine, which is used for attack detection besides other proposed modules. Furthermore, a whitelist method is implemented using Bloom data structure for attack prevention. The proposed method is completely implemented and tested using different test scenarios. The obtained results show that by using proposed method, attacks can be detected more accurately with lower false ratios and delay in comparison with the existing methods.
引用
收藏
页数:26
相关论文
共 48 条
  • [11] An anomaly-based approach to the analysis of the social behavior of VoIP users
    Chiappetta, S.
    Mazzariello, C.
    Presta, R.
    Romano, S. P.
    [J]. COMPUTER NETWORKS, 2013, 57 (06) : 1545 - 1559
  • [12] A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks
    De Rango, Floriano
    Fazio, Peppino
    Scarcello, Francesco
    Conte, Francesco
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (10) : 2185 - 2198
  • [13] Two layer denial of service prevention on SIP VoIP infrastructures
    Ehlert, Sven
    Zhang, Ge
    Geneiatakis, Dimitris
    Kambourakis, Georgios
    Dagiuklas, Tasos
    Markl, Jiri
    Sisalem, Dorgham
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (10) : 2443 - 2456
  • [14] Survey of network security systems to counter SIP-based denial-of-service attacks
    Ehlert, Sven
    Geneiatakis, Dimitris
    Magedanz, Thomas
    [J]. COMPUTERS & SECURITY, 2010, 29 (02) : 225 - 243
  • [15] Summary cache: A scalable wide-area Web cache sharing protocol
    Fan, L
    Cao, P
    Almeida, J
    Broder, AZ
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (03) : 281 - 293
  • [16] SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL
    Geneiatakis, Dimitris
    Dagiuklas, Tasos
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Gritzalis, Stefanos
    Ehlert, Sven
    Sisalem, Dorgham
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) : 68 - 81
  • [17] Utilizing bloom filters for detecting flooding attacks against SIP based services
    Geneiatakis, Dimitris
    Vrakas, Nikos
    Lambrinoudakis, Costas
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 578 - 591
  • [18] Ghafarian A, 2016, 2016 SAU COMP C SAI
  • [19] Golait D, 2016, P 22 NATL C COMMUNIC, P1, DOI DOI 10.1109/NCC.2016.7561121
  • [20] Hussain I, 2011, WIR COMM MOB COMP C