A Bayesian change point model for detecting SIP-based DDoS attacks

被引:24
|
作者
Kurt, Baris [1 ]
Yildiz, Cagatay [1 ]
Ceritli, Taha Yusuf [1 ]
Sankur, Bulent [2 ]
Cemgil, Ali Taylan [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
[2] Bogazici Univ, Dept Elect & Elect Engn, TR-34342 Istanbul, Turkey
关键词
VoIP security; SIP; DDoS; Simulation; Bayesian change point models;
D O I
10.1016/j.dsp.2017.10.009
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Session Initiation Protocol (SIP), as one the most common signaling mechanism for Voice Over Internet Protocol (VoIP) applications, is a popular target for the flooding-based Distributed Denial of Service (DDoS) attacks. In this paper, we propose a DDoS attack detection framework based on the Bayesian multiple change model, which can detect different types of flooding attacks. Additionally, we propose a probabilistic SIP network simulation system that provides a test environment for network security tools. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:48 / 62
页数:15
相关论文
共 50 条
  • [1] A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems
    Younes, Osama S.
    [J]. COMPUTER NETWORKS, 2024, 240
  • [2] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [3] Security of SIP-Based Infrastructure against Malicious Message Attacks
    Shrestha, Ajay Kumar
    [J]. 8TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA 2014), 2014,
  • [4] Detecting Unprotected SIP-based Voice Over IP Traffic
    Carvajal, Leonardo
    Chen, Lei
    Varol, Cihan
    Rawat, Dandy
    [J]. 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 44 - 48
  • [5] A framework for protecting a SIP-based infrastructure against malformed message attacks
    Geneiatakis, Dimitris
    Kambourakis, Georgios
    Lambrinoudakis, Costas
    Dagiuklas, Tasos
    Gritzalis, Stefanos
    [J]. COMPUTER NETWORKS, 2007, 51 (10) : 2580 - 2593
  • [6] Detecting flooding-based DDoS attacks
    You, Yonghua
    Zulkernine, Mohammad
    Haque, Anwar
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1229 - +
  • [7] Design of an Enhanced Redundant SIP Model for Securing SIP-Based Networks
    Rasol, Mohammad
    Al Saidat, Saleem
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [8] A novel model for detecting application layer DDoS attacks
    Xie, Yi
    Yu, Shun-Zheng
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 56 - +
  • [9] A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    Dimitris Geneiatakis
    Costas Lambrinoudakis
    [J]. Telecommunication Systems, 2007, 36 : 153 - 159
  • [10] Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks
    Tang, Jin
    Hao, Yong
    Cheng, Yu
    Zhou, Chi
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,