Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages

被引:8
|
作者
Ryu, Jea-Tek [1 ]
Roh, Byeong-Hee [1 ]
Ryu, Ki-Yeol [1 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun, Suwon 443749, South Korea
关键词
SIP flooding; flooding detection; SIP flooding attack; SIP security; SIP threat;
D O I
10.3837/tiis.2009.05.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since SIP uses a text-based message format and is open to the public Internet, it provides a number of potential opportunities for Denial of Service (DoS) attacks in a similar manner to most Internet applications. In this paper, we propose an effective detection method for SIP flooding attacks in order to deal with the problems of conventional schemes. We derive the upper bound of the possible number of SIP messages, considering not only the network congestion status but also the different properties of individual SIP messages such as INVITE, BYE and CANCEL. The proposed method can be easily extended to detect flooding attacks by other SIP messages.
引用
下载
收藏
页码:507 / 526
页数:20
相关论文
共 50 条
  • [1] Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks
    Tang, Jin
    Cheng, Yu
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [2] A SIP delayed based mechanism for detecting VOIP flooding attacks
    Dassouki, Khaled
    Safa, Haidar
    Hijazi, Abbas
    El-Hajj, Wassim
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 588 - 593
  • [3] RESEARCH ON DETECTING SIP MESSAGE FLOODING ATTACKS
    Sun, Qibo
    Qian, Shuang
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 278 - +
  • [4] Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks
    Tang, Jin
    Cheng, Yu
    Hao, Yong
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 1161 - 1169
  • [5] An Approach to Resisting Malformed and Flooding Attacks on SIP Servers
    Su, Ming-Yang
    Tsai, Chen-Han
    JOURNAL OF NETWORKS, 2015, 10 (02) : 77 - 84
  • [6] Utilizing bloom filters for detecting flooding attacks against SIP based services
    Geneiatakis, Dimitris
    Vrakas, Nikos
    Lambrinoudakis, Costas
    COMPUTERS & SECURITY, 2009, 28 (07) : 578 - 591
  • [7] Protecting SIP against Very Large Flooding DoS Attacks
    Huici, Felipe
    Niccolini, Saverio
    d'Heureuse, Nico
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1369 - 1374
  • [8] Modeling SIP Normal Traffic to Detect and Prevent SIP-VoIP Flooding Attacks Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    2016 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2016, : 274 - 279
  • [9] Detection of malformed SIP messages based on map-reduce model
    Shuang, Kai
    Xia, Qian-Lin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2014, 37 (06): : 11 - 16
  • [10] Sketch-Based SIP Flooding Detection Using Hellinger Distance
    Tang, Jin
    Cheng, Yu
    Zhou, Chi
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3380 - 3385