Analyzing Anomalies in Anonymized SIP Traffic

被引:0
|
作者
Stanek, Jan [1 ]
Kencl, Lukas [1 ]
Kuthan, Jiri [2 ]
机构
[1] Czech Tech Univ, Prague 16627 6, Czech Republic
[2] Tekelec, D-13507 Berlin, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Session Initiation Protocol (SIP) is a signaling protocol widely used nowadays for controlling multimedia communication sessions. Thus, understanding and troubleshooting SIP behavior is of utmost importance to network designers and operators. However, SIP traffic traces are hard to come by due to privacy and confidentiality issues. SIP contains a lot of personal information spread within the various SIP messages - IP addresses, names, usernames and domains, e-mail addresses etc. The known IP-address anonymization methods are thus insufficient. We present SiAnTo, an extended anonymization technique that substitutes session-participant information with matching, but nondescript, labels. This allows for SIP traces to be publicly shared, while keeping interesting traffic-session properties intact. We further demonstrate its usefulness by studying the problem of SIP NAT traversal as recorded in the anonymized traces. We analyze properties of the so-called "registration storm" incident and measure the influence of the active NAT traversal techniques on SIP traffic pattern, both only possible thanks to the preservation of session relationships inside the anonymized traces. As further benefit to the research community, we set up a public data-store with both the anonymization module and the anonymized traces available and invite other parties to share further SIP data using these open tools.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [1] α-MON: Anonymized Passive Traffic Monitoring
    Favale, Thomas
    Trevisan, Martino
    Drago, Idilio
    Mellia, Marco
    PROCEEDINGS OF THE 2020 32ND INTERNATIONAL TELETRAFFIC CONGRESS (ITC 32), 2020, : 10 - 18
  • [2] Analyzing the Performance of Web-services during Traffic Anomalies
    Dhingra, Avneet
    Sachdeva, Monika
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (06) : 169 - 177
  • [3] An Approach for Detecting Anonymized Traffic: Orbot as Case Study
    Automatic Control and Computer Sciences, 2022, 56 : 45 - 57
  • [4] An Approach for Detecting Anonymized Traffic: Orbot as Case Study
    Merouane, Mehdi
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (01) : 45 - 57
  • [5] The science of guessing: analyzing an anonymized corpus of 70 million passwords
    Bonneau, Joseph
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 538 - 552
  • [6] Encapsulated and anonymized network video traffic classification with generative models
    Chen, Tianhua
    Grabs, Elans
    Petersons, Ernests
    Efrosinin, Dmitry
    Ipatovs, Aleksandrs
    Kluga, Janis
    2022 WORKSHOP ON MICROWAVE THEORY AND TECHNIQUES IN WIRELESS COMMUNICATIONS (MTTW), 2022, : 13 - 18
  • [7] GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic
    Jones, Michael
    Kepner, Jeremy
    Andersen, Daniel
    Buluc, Aydin
    Byun, Chansup
    Claffy, K.
    Davis, Timothy
    Arcand, William
    Bernays, Jonathan
    Bestor, David
    Bergeron, William
    Gadepally, Vijay
    Houle, Micheal
    Hubbell, Matthew
    Jananthan, Hayden
    Klein, Anna
    Meiners, Chad
    Milechin, Lauren
    Mullen, Julie
    Pisharody, Sandeep
    Prout, Andrew
    Reuther, Albert
    Rosa, Antonio
    Samsi, Siddharth
    Sreekanth, Jon
    Stetson, Doug
    Yee, Charles
    Michaleas, Peter
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [8] SANTT: Sharing Anonymized Network Traffic Traces among Researchers
    Shao, Xiaoxin
    Zhang, Qianli
    He, Tao
    Kong, Shijin
    An, Changqin
    Li, Xing
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 527 - +
  • [9] Analyzing the QoS of VoIP on SIP in Java']Java
    da Silva, J. M., Jr.
    Lins, R. D.
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 576 - 581
  • [10] Comparison between normal and TOR-Anonymized Web Client Traffic
    Liska, Tomas
    Sochor, Tomas
    Sochorova, Hana
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3