A SIP delayed based mechanism for detecting VOIP flooding attacks

作者: Khaled Dassouki , Haidar Safa , Abbas Hijazi , Wassim El-Hajj

DOI: 10.1109/IWCMC.2016.7577123

关键词:

摘要: SIP is amongst the most popular Voice over IP signaling protocols. Its deployment in live scenarios showed its vulnerability to flooding attacks. In this paper, we present a attack detection mechanism that dynamically detects attacks and correlates real time temporal characteristics of reliable number received INVITE requests. Experimental results show proposed able detect rapidly does not suffer from false alarms. When compared other similar approaches literature, approach outperformed terms detections speed accuracy.

参考文章(22)
Jin Tang, Yu Cheng, SIP Flooding Attack Detection Springer, New York, NY. pp. 53- 70 ,(2013) , 10.1007/978-1-4614-8996-2_4
Zhiqiang Chen, Wushao Wen, Da Yu, None, Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS) 2012 International Conference on Computing, Networking and Communications (ICNC). pp. 154- 158 ,(2012) , 10.1109/ICCNC.2012.6167401
Khaled Dassouki, Herve Debar, Haidar Safa, Abbas Hijazi, A TCP delay-based mechanism for detecting congestion in the Internet international conference on communications. pp. 141- 145 ,(2013) , 10.1109/ICCITECHNOLOGY.2013.6579538
Husameldin Mukhtar, Khaled Salah, Youssef Iraqi, Mitigation of DHCP starvation attack Computers & Electrical Engineering. ,vol. 38, pp. 1115- 1128 ,(2012) , 10.1016/J.COMPELECENG.2012.06.005
Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis, Utilizing bloom filters for detecting flooding attacks against SIP based services Computers & Security. ,vol. 28, pp. 578- 591 ,(2009) , 10.1016/J.COSE.2009.04.007
T. PHIT, K. ABE, A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation IEICE Transactions on Communications. ,vol. 91, pp. 3956- 3965 ,(2008) , 10.1093/IETCOM/E91-B.12.3956
Khaled Dassouki, Haidar Safa, Abbas Hijazi, End to End Mechanism to Protect Sip from Signaling Attacks new technologies, mobility and security. pp. 1- 5 ,(2014) , 10.1109/NTMS.2014.6814017
Khaled Salah, Jose Maria Alcaraz Calero, Sherali Zeadally, Sameera Almulla, Mohammed ZAaabi, Using Cloud Computing to Implement a Security Overlay Network ieee symposium on security and privacy. ,vol. 11, pp. 44- 53 ,(2013) , 10.1109/MSP.2012.88
Dongwon Seo, Heejo Lee, Ejovi Nuwere, Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models information security conference. pp. 397- 411 ,(2008) , 10.1007/978-0-387-09699-5_26
Angelos D. Keromytis, A Survey of Voice over IP Security Research international conference on information systems security. ,vol. 5905, pp. 1- 17 ,(2009) , 10.1007/978-3-642-10772-6_1