Detecting DoS attacks on SIP systems

被引:0
|
作者
Chen, Eric Y. [1 ]
机构
[1] NTT Corp, NTT Informat Sharing Platform Labs, Musashino, Tokyo 1808585, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As VoIP technology becomes more widely deployed due to its economical advantage over traditional PSTN services, VoIP servers and clients will become attractive targets of Denial of Service (DoS) attacks. This paper proposes a method to detect DoS attacks that involve flooding SIP entities with illegitimate SIP messages. We modify the original finite-state machines for SIP transactions in such a way that transaction anomalies can be detected in a stateful manner We also propose to use four threshold parameters to confirm an attack.
引用
收藏
页码:53 / 58
页数:6
相关论文
共 50 条
  • [31] A Bayesian change point model for detecting SIP-based DDoS attacks
    Kurt, Baris
    Yildiz, Cagatay
    Ceritli, Taha Yusuf
    Sankur, Bulent
    Cemgil, Ali Taylan
    DIGITAL SIGNAL PROCESSING, 2018, 77 : 48 - 62
  • [32] Utilizing bloom filters for detecting flooding attacks against SIP based services
    Geneiatakis, Dimitris
    Vrakas, Nikos
    Lambrinoudakis, Costas
    COMPUTERS & SECURITY, 2009, 28 (07) : 578 - 591
  • [33] Testing of Network Security Systems Through DoS Attacks
    Maraj, Arianit
    Jakupi, Genc
    Rogova, Ermir
    Grajqevci, Xheladin
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 368 - 373
  • [34] Protecting Satellite Systems from Disassociation DoS Attacks
    Ting Ma
    Yee Hui Lee
    Maode Ma
    Wireless Personal Communications, 2013, 69 : 623 - 638
  • [35] Protecting Satellite Systems from Disassociation DoS Attacks
    Ma, Ting
    Lee, Yee Hui
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (02) : 623 - 638
  • [36] Stabilization of Networked Switched Systems Under DoS Attacks
    Li, Dandan
    Cai, Qianqian
    Marelli, Damian
    Meng, Wei
    Fu, Minyue
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (08) : 4859 - 4866
  • [37] Robust secure consensus of multiagent systems with DoS attacks
    Du, Shengli
    Yan, Qiushuo
    Qiao, Junfei
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2023, 45 (03) : 393 - 399
  • [38] Coordinated cyber-physical attacks considering DoS attacks in power systems
    Tian, Jiwei
    Wang, Buhong
    Li, Tengyao
    Shang, Fute
    Cao, Kunrui
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4345 - 4358
  • [39] Study of Thwarting DoS Attacks by Detecting MAC Spoof in WLAN Infrastructure Networks
    Persia, A.
    Durairaj, M.
    Sivagowry, S.
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 264 - 268
  • [40] A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS Attacks
    Kang, Seung-Ho
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,