A method for disguising malformed SIP messages to evade SIP IDS

被引:0
|
作者
机构
[1] Wang, Yulong
[2] Wang, Lei
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
IDS evasion - Intrusion Detection Systems - IP multimedia subsystems - SIP (session initiation protocol) - Testing systems - VoIP systems;
D O I
10.4304/jsw.8.11.2830-2838
中图分类号
学科分类号
摘要
Malformed SIP attacks are threatening the security of VoIP system, such as IP Multimedia Subsystem, which uses SIP (Session Initiation Protocol) as its core protocol. Though IDSs (Intrusion Detection System) supporting malformed SIP detection had been produced, it was not clear to what extent they can detect disguised malformed SIP messages. This paper analyzes the condition of SIP IDS evasion and proposes a method for disguising malformed SIP messages. Based on the disguising method, a testing system is built for evaluation the capability of SIP IDS on evasion defending. The result of the experiments show that the proposed method can improve the evasion rate of malformed SIP messages considerably, which means the defending capability of SIP IDSs should be improved to prevent them from evasion. © 2013 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [21] SIP Flow Time Interval between Messages of Statistical Analysis
    Jarutis, A.
    Gedmantas, R.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (05) : 89 - 92
  • [22] Improvement of link efficiency by compressing SIP signaling messages with SigComp
    Wook, Hyun
    Kang, Shin-Gak
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1314 - 1317
  • [23] The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems
    Tsiatsikas, Zisis
    Kambourakis, Georgios
    Geneiatakis, Dimitris
    Wang, Hua
    IEEE ACCESS, 2019, 7 : 2401 - 2417
  • [24] TLS Handshake Method Based on SIP
    Kaji, Tadashi
    Hoshino, Kazuyoshi
    Fujishiro, Takahiro
    Takata, Osamu
    Yato, Akifumi
    Takeuchi, Keisuke
    Tezuka, Satoru
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (01): : 12 - 19
  • [25] On Locating Loss Links of Signaling Messages in SIP-based Services
    Usui, Takeshi
    Kubo, Takeshi
    Kitatsuji, Yoshinori
    Hasegawa, Teruyuki
    Yokota, Hidetoshi
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5489 - 5495
  • [26] Sip and spit or sip and swallow: Choice of method differentially alters taste intensity estimates across stimuli
    Running, Cordelia A.
    Hayes, John E.
    PHYSIOLOGY & BEHAVIOR, 2017, 181 : 95 - 99
  • [27] A Study on Locating Lossy Links of Signaling Messages in SIP-Based Services
    Usui, Takeshi
    Kubo, Takeshi
    Ktatsuji, Yoshinori
    Yokota, Hidetoshi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (01) : 118 - 127
  • [28] A Cooperative Overload Control Method for SIP Servers
    Akbar, Abdullah
    Basha, S. Mahaboob
    Sattar, Syed Abdul
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1296 - 1300
  • [29] MIME Type for ICE Candidates to Reduce the Size of SIP Session Setup Signaling Messages
    Guduru, Kiran Kumar
    Usha, J.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 318 - 322
  • [30] A Kind of SIP Message Extension Method for Time Synchronization
    Lei, Weimin
    Bao, Ying
    Dai, Mingzhu
    Guan, Yunchong
    INTERNATIONAL CONFERENCE ON REMOTE SENSING AND WIRELESS COMMUNICATIONS (RSWC 2014), 2014, : 412 - 420