A method for disguising malformed SIP messages to evade SIP IDS

被引:0
|
作者
机构
[1] Wang, Yulong
[2] Wang, Lei
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
IDS evasion - Intrusion Detection Systems - IP multimedia subsystems - SIP (session initiation protocol) - Testing systems - VoIP systems;
D O I
10.4304/jsw.8.11.2830-2838
中图分类号
学科分类号
摘要
Malformed SIP attacks are threatening the security of VoIP system, such as IP Multimedia Subsystem, which uses SIP (Session Initiation Protocol) as its core protocol. Though IDSs (Intrusion Detection System) supporting malformed SIP detection had been produced, it was not clear to what extent they can detect disguised malformed SIP messages. This paper analyzes the condition of SIP IDS evasion and proposes a method for disguising malformed SIP messages. Based on the disguising method, a testing system is built for evaluation the capability of SIP IDS on evasion defending. The result of the experiments show that the proposed method can improve the evasion rate of malformed SIP messages considerably, which means the defending capability of SIP IDSs should be improved to prevent them from evasion. © 2013 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [31] Implementation of the SIP express router with mediaproxy method on VoIP
    Nurwarsito, Heru
    Arief Setyawan, R.
    Primananda, Rakhmadhany
    World Academy of Science, Engineering and Technology, 2010, 43 : 760 - 765
  • [32] A Novel Method for Detecting Attacks Towards the SIP Protocol
    Callegari, Christian
    Garroppo, Rosario G.
    Giordano, Stefano
    Pagano, Michele
    Russo, Franco
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 268 - 273
  • [33] A Method for Trustworthy SIP-Based VoIP Transmission
    Qin, Ying
    Chang, Xiaolin
    Han, Zhen
    Liu, Jiqiang
    Xing, Bin
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1171 - 1174
  • [34] Research on linear inversion of SIP using the Debye decomposition method
    Wang, Shu
    Yang, Jin
    Su, Peng
    JOURNAL OF APPLIED GEOPHYSICS, 2023, 212
  • [35] An efficient and easily deployable method for dealing with DoS in SIP services
    Tsiatsikas, Zisis
    Geneiatakis, Dimitris
    Kambourakis, Georgios
    Keromytis, Angelos D.
    COMPUTER COMMUNICATIONS, 2015, 57 : 50 - 63
  • [36] OPTIMUM SIP METHOD ACCELERATION PARAMETERS FOR NEUTRON DIFFUSION EQUATION
    STEINKE, RG
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1971, 14 (01): : 206 - &
  • [37] A practical method for SIP-DoS attack effect evaluation
    Wang, Yulong
    Yang, Yi
    Journal of Information and Computational Science, 2012, 9 (02): : 333 - 345
  • [38] SIP Method Escalation Algorithm for NGN Application Network Interface
    Ueda, Kiyoshi
    Shimizu, Hitoshi
    Iwata, Tetsuya
    Sunaga, Hiroshi
    Fukuda, Akira
    2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, : 77 - +
  • [39] A SIP-based method for intra-domain handoffs
    Vali, D
    Paskalis, S
    Kaloxylos, A
    Merakos, L
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2068 - 2072
  • [40] DSC-SIP METHOD FOR TWO-DIMENSIONAL SCATTERING PROBLEM
    Li, Hai
    Shao, Zhenhai
    Yeo, Sweeping
    Leong, Yewkong
    Lim, Menghiot
    MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, 2011, 53 (08) : 1746 - 1750