Anomaly-based DoS detection and prevention in SIP networks by modeling SIP normal traffic

被引:2
作者
Hosseinpour, Mahsa [1 ]
Yaghmaee, Mohammad Hossein [1 ]
Seno, Seyed Amin Hosseini [1 ]
Roshkhari, Hossein Khosravi [1 ]
Asadi, Mohsen [1 ]
机构
[1] FUM, Dept Comp Engn, Mashhad, Iran
关键词
VoIP network; SIP security; DoS attacks; finite state machine (FSM); VOIP; SECURITY; ATTACKS; PROTOCOL; DEFENSE;
D O I
10.1002/dac.3825
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the various features of Voice over Internet Protocol (VoIP), this technology has attracted the attention of many users in comparison with the traditional telephony system. However, with the growth of this technology, the security issues and protection of its users against different kinds of threats have been raised as an essential requirement. Session Initiation Protocol is a predominant protocol to initiate and terminate multimedia sessions in VoIP networks that provide simplicity and text-based features. Despite its mentioned advantages, these features impose several vulnerabilities on VoIP networks. Denial of Service attack, as one of the most common attacks against VoIP networks, is also a noted security issue in the Internet Protocol platforms. In such attacks, the attacker tries to prevent service from authorized users by consuming server resources. These attacks can be launched by sending out-of-sequence messages, malformed messages, and flooding different kinds of messages. In this study, a new anomaly-based method is presented for detection and prevention of these attacks. Normal traffic of a VoIP network is modeled by making a finite state machine, which is used for attack detection besides other proposed modules. Furthermore, a whitelist method is implemented using Bloom data structure for attack prevention. The proposed method is completely implemented and tested using different test scenarios. The obtained results show that by using proposed method, attacks can be detected more accurately with lower false ratios and delay in comparison with the existing methods.
引用
收藏
页数:26
相关论文
共 48 条
[11]   An anomaly-based approach to the analysis of the social behavior of VoIP users [J].
Chiappetta, S. ;
Mazzariello, C. ;
Presta, R. ;
Romano, S. P. .
COMPUTER NETWORKS, 2013, 57 (06) :1545-1559
[12]   A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks [J].
De Rango, Floriano ;
Fazio, Peppino ;
Scarcello, Francesco ;
Conte, Francesco .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (10) :2185-2198
[13]   Two layer denial of service prevention on SIP VoIP infrastructures [J].
Ehlert, Sven ;
Zhang, Ge ;
Geneiatakis, Dimitris ;
Kambourakis, Georgios ;
Dagiuklas, Tasos ;
Markl, Jiri ;
Sisalem, Dorgham .
COMPUTER COMMUNICATIONS, 2008, 31 (10) :2443-2456
[14]   Survey of network security systems to counter SIP-based denial-of-service attacks [J].
Ehlert, Sven ;
Geneiatakis, Dimitris ;
Magedanz, Thomas .
COMPUTERS & SECURITY, 2010, 29 (02) :225-243
[15]   Summary cache: A scalable wide-area Web cache sharing protocol [J].
Fan, L ;
Cao, P ;
Almeida, J ;
Broder, AZ .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (03) :281-293
[16]   SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL [J].
Geneiatakis, Dimitris ;
Dagiuklas, Tasos ;
Kambourakis, Georgios ;
Lambrinoudakis, Costas ;
Gritzalis, Stefanos ;
Ehlert, Sven ;
Sisalem, Dorgham .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) :68-81
[17]   Utilizing bloom filters for detecting flooding attacks against SIP based services [J].
Geneiatakis, Dimitris ;
Vrakas, Nikos ;
Lambrinoudakis, Costas .
COMPUTERS & SECURITY, 2009, 28 (07) :578-591
[18]  
Ghafarian A, 2016, 2016 SAU COMP C SAI
[19]  
Golait D, 2016, P 22 NATL C COMMUNIC, P1, DOI DOI 10.1109/NCC.2016.7561121
[20]  
Hussain I, 2011, WIR COMM MOB COMP C