Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks

被引:0
|
作者
Tang, Jin [1 ]
Hao, Yong [1 ]
Cheng, Yu [1 ]
Zhou, Chi [1 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Session Initiation Protocol (SIP) has been widely used in VoIP for session control and management. As the basic SIP specifications do not require the proxy servers to track the states of established sessions, an extension header field "Session-Expires" has been proposed for SIP to allow the proxy server to hold resources for established sessions just within the specified periods. In this paper, we identify a novel denial of service (DoS) attack utilizing this SIP extension to drain resources of the proxy servers in wireless VoIP. In particular, by deliberately setting a large value of the "Session-Expires" header and then physically disconnecting from the wireless network, attackers can repeatedly hold resources of the proxy server as long as they want. Also, the low-volume nature of the attack allows it to avoid being detected by existing volume-based intrusion detection systems. As a counter-measure, we propose a robust detection scheme based on the statistical Anderson-Darling test. The key insight that leads to the scheme is the changed statistical property of the header values induced by the attack. We validate the performance through computer simulation. The scheme shows its ability to detect the attack and is even more effective when applied against the distributed denial of service (DDoS) attack.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks
    Safoine, Rababe
    Mounir, Soufyane
    Farchi, Abdelmajid
    [J]. PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 88 - 92
  • [2] Evaluation of SIP-based VOIP in heterogeneous networks
    Khedr, Mohamed
    El Aleem, Onsy Abd
    Selim, Mohamed Mahmoued
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 184 - +
  • [3] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [4] Detection And Countermeasure Scheme For Call-Disruption Attacks On SIP-Based Voip Services
    Ryu, Jea Tek
    Roh, Byeong-hee
    Ryu, Ki Yeol
    Yoon, Myungchul
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (07): : 1854 - 1873
  • [5] SIP-based VoIP Experiment for Disadvantaged Tactical Edge Networks
    Wang, Sherry
    Zheng, Harold
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON TESTBEDS AND RESEARCH INFRASTRUCTURES FOR THE DEVELOPMENT OF NETWORKS & COMMUNITIES, 2009, : 286 - 291
  • [6] Audio CAPTCHA for SIP-Based VoIP
    Soupionis, Yannis
    Tountas, George
    Gritzalis, Dimitris
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 25 - 38
  • [7] Implementing a secure VoIP communication over SIP-based networks
    Wen-Bin Hsieh
    Jenq-Shiou Leu
    [J]. Wireless Networks, 2018, 24 : 2915 - 2926
  • [8] Implementing a secure VoIP communication over SIP-based networks
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. WIRELESS NETWORKS, 2018, 24 (08) : 2915 - 2926
  • [9] A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    Dimitris Geneiatakis
    Costas Lambrinoudakis
    [J]. Telecommunication Systems, 2007, 36 : 153 - 159
  • [10] A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    Geneiatakis, Dimitris
    Lambrinoudakis, Costas
    [J]. TELECOMMUNICATION SYSTEMS, 2007, 36 (04) : 153 - 159