Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks

被引:0
|
作者
Tang, Jin [1 ]
Hao, Yong [1 ]
Cheng, Yu [1 ]
Zhou, Chi [1 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Session Initiation Protocol (SIP) has been widely used in VoIP for session control and management. As the basic SIP specifications do not require the proxy servers to track the states of established sessions, an extension header field "Session-Expires" has been proposed for SIP to allow the proxy server to hold resources for established sessions just within the specified periods. In this paper, we identify a novel denial of service (DoS) attack utilizing this SIP extension to drain resources of the proxy servers in wireless VoIP. In particular, by deliberately setting a large value of the "Session-Expires" header and then physically disconnecting from the wireless network, attackers can repeatedly hold resources of the proxy server as long as they want. Also, the low-volume nature of the attack allows it to avoid being detected by existing volume-based intrusion detection systems. As a counter-measure, we propose a robust detection scheme based on the statistical Anderson-Darling test. The key insight that leads to the scheme is the changed statistical property of the header values induced by the attack. We validate the performance through computer simulation. The scheme shows its ability to detect the attack and is even more effective when applied against the distributed denial of service (DDoS) attack.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] SIP-based VOIP telephone system design and implementation
    Bai, Xiuxuan
    Zhou, Wenkai
    Ni, Yulin
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IX, 2010, : 175 - 178
  • [22] Seamless SIP-based VolP in disparate wireless systems and networks
    Rajkumar, A
    Feder, P
    Benno, S
    Janiszewski, T
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 65 - 82
  • [23] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Akbar, Muhammad Ali
    Farooq, Muddassar
    KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 38 (02) : 491 - 510
  • [24] SIP-based adaptive multimedia transmissions for wired and wireless networks
    Jia, WJ
    Yuen, MC
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2005, 3756 : 505 - 514
  • [25] Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony
    Muhammad Ali Akbar
    Muddassar Farooq
    Knowledge and Information Systems, 2014, 38 : 491 - 510
  • [26] SIP-based VoIP network and its interworking with the PSTN
    Zhang, Y
    ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2002, 14 (06): : 273 - 282
  • [27] Research on Security Mechanisms of SIP-based VoIP System
    Shan, Liancheng
    Jiang, Ning
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 408 - 410
  • [28] SIP-based VOIP telephone system design and implementation
    Bai, Xiuxuan
    Zhou, Wenkai
    Ni, Yulin
    2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL IV, 2011, : 174 - 177
  • [29] Evaluation of Security and Countermeasures for a SIP-based VoIP Architecture
    Herculea, Marius
    Blaga, Tudor Mihai
    Dobrota, Virgil
    ROEDUNET 2008 CONFERENCE PROCEEDINGS, 2008, : 34 - 39
  • [30] An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks
    Zhang, Liping
    Tang, Shanyu
    Zhu, Shaohui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 126 - 133