Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers

被引:0
作者
Yum, Dae Hyun
Kim, Sun Young
Moon, HoKun
Kim, Mi-Yeon
Roh, Jae-Hoon
Lee, Pil Joong
机构
来源
INFORMATION SECURITY APPLICATIONS | 2009年 / 5932卷
关键词
VoIP; SIP; DoS attack; detection system; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NON (Next Generation Network) is often called network as the general idea behind NON is that one network transports all information and services. When NON is deployed in a large scale. VoIP will eventually replace PSTN, the traditional model of voice telephony. While VoIP promises both low cost and a variety of advanced services, it may entail security vulnerabilities. Unlike PSTN, intelligence is placed at the edge and the security measures are not incorporated into the network. VoIP-specific attacks have already been introduced, of which the ringing-based DoS attack belongs. In this paper, we propose it detection system of the ringing-based DoS attacks. We model the normal traffic.: of legitimate users with the gamma distribution and then quantify the discrepancy between the normal traffic and the attack traffic with Pearson's chi-square statistic. Simulation results show that the proposed detection system can reliably detect the ringing-based DoS attacks.
引用
收藏
页码:339 / 353
页数:15
相关论文
共 37 条
[1]  
Abidogun O.A., 2005, Data Mining, Fraud Detection and Mobile Telecommunications: Call Pattern Analysis with Unsupervised Neural Networks
[2]  
[Anonymous], 2006, PROBABILITY STAT ENG
[3]  
Basseville Michele, 1993, Detection of abrupt changes: theory and application, V104
[4]   Assessing the risk of intercepting VoIP calls [J].
Benini, M. ;
Sicari, S. .
COMPUTER NETWORKS, 2008, 52 (12) :2432-2446
[5]   Denial-of-service attack-detection techniques [J].
Carl, G ;
Kesidis, G ;
Brooks, RR ;
Rai, S .
IEEE INTERNET COMPUTING, 2006, 10 (01) :82-89
[6]  
Chen EY, 2006, VoIP MaSe 06: 1st IEEE Workshop on VoIP Management and Security, P53
[7]   Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks [J].
Conner, William ;
Nahrstedt, Klara .
ISM: 2008 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, 2008, :340-347
[8]   Statistical approaches to DDoS attack detection and response [J].
Feinstein, L ;
Schnackenberg, D ;
Balupari, R ;
Kindred, D .
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, :303-314
[9]   SURVEY OF SECURITY VULNERABILITIES IN SESSION INITIATION PROTOCOL [J].
Geneiatakis, Dimitris ;
Dagiuklas, Tasos ;
Kambourakis, Georgios ;
Lambrinoudakis, Costas ;
Gritzalis, Stefanos ;
Ehlert, Sven ;
Sisalem, Dorgham .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2006, 8 (03) :68-81
[10]   Understanding individual human mobility patterns [J].
Gonzalez, Marta C. ;
Hidalgo, Cesar A. ;
Barabasi, Albert-Laszlo .
NATURE, 2008, 453 (7196) :779-782