Analyzing Anomalies in Anonymized SIP Traffic

被引:0
|
作者
Stanek, Jan [1 ]
Kencl, Lukas [1 ]
Kuthan, Jiri [2 ]
机构
[1] Czech Tech Univ, Prague 16627 6, Czech Republic
[2] Tekelec, D-13507 Berlin, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Session Initiation Protocol (SIP) is a signaling protocol widely used nowadays for controlling multimedia communication sessions. Thus, understanding and troubleshooting SIP behavior is of utmost importance to network designers and operators. However, SIP traffic traces are hard to come by due to privacy and confidentiality issues. SIP contains a lot of personal information spread within the various SIP messages - IP addresses, names, usernames and domains, e-mail addresses etc. The known IP-address anonymization methods are thus insufficient. We present SiAnTo, an extended anonymization technique that substitutes session-participant information with matching, but nondescript, labels. This allows for SIP traces to be publicly shared, while keeping interesting traffic-session properties intact. We further demonstrate its usefulness by studying the problem of SIP NAT traversal as recorded in the anonymized traces. We analyze properties of the so-called "registration storm" incident and measure the influence of the active NAT traversal techniques on SIP traffic pattern, both only possible thanks to the preservation of session relationships inside the anonymized traces. As further benefit to the research community, we set up a public data-store with both the anonymization module and the anonymized traces available and invite other parties to share further SIP data using these open tools.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [21] Optimization of signaling traffic in centralized conferences using SIP
    Miladinovic, I. (igor.miladinovic@tuwien.ac.at), 2002, World Scientific and Engineering Academy and Society
  • [22] Applying PR-SCTP to transport SIP traffic
    Wang, XL
    Leung, VCM
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 776 - 780
  • [23] Analyzing Outbound Network Traffic
    Skrzewski, Miroslaw
    COMPUTER NETWORKS, 2011, 160 : 204 - 213
  • [24] Detection and Classification of Traffic Anomalies Using Microscopic Traffic Variables
    Barria, Javier A.
    Thajchayapong, Suttipong
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2011, 12 (03) : 695 - 704
  • [25] Distributed Classification of Traffic Anomalies Using Microscopic Traffic Variables
    Thajchayapong, Suttipong
    Garcia-Trevino, Edgar S.
    Barria, Javier A.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (01) : 448 - 458
  • [26] A Taxonomy of Anomalies in Backbone Network Traffic
    Mazel, Johan
    Fontugne, Romain
    Fukuda, Kensuke
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 30 - 36
  • [27] Horizontal traffic signs anomalies and their classification
    Lengyel, Henrietta
    Szalay, Zsolt
    XXIII INTERNATIONAL CONFERENCE ON MANUFACTURING (MANUFACTURING 2018), 2018, 448
  • [28] A Flow Analysis For Mining Traffic Anomalies
    Kanda, Yoshiki
    Fukuda, Kensuke
    Sugawara, Toshiharu
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [29] Characteristics of network traffic flow anomalies
    Barford, P
    Plonka, D
    IMW 2001: PROCEEDINGS OF THE FIRST ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP, 2001, : 69 - 73
  • [30] Spatiotemporal model for Internet traffic anomalies
    Bandara, Vidarshana W.
    Pezeshki, Ali
    Jayasumana, Anura P.
    IET NETWORKS, 2014, 3 (01) : 41 - 53