Analyzing Anomalies in Anonymized SIP Traffic

被引:0
|
作者
Stanek, Jan [1 ]
Kencl, Lukas [1 ]
Kuthan, Jiri [2 ]
机构
[1] Czech Tech Univ, Prague 16627 6, Czech Republic
[2] Tekelec, D-13507 Berlin, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Session Initiation Protocol (SIP) is a signaling protocol widely used nowadays for controlling multimedia communication sessions. Thus, understanding and troubleshooting SIP behavior is of utmost importance to network designers and operators. However, SIP traffic traces are hard to come by due to privacy and confidentiality issues. SIP contains a lot of personal information spread within the various SIP messages - IP addresses, names, usernames and domains, e-mail addresses etc. The known IP-address anonymization methods are thus insufficient. We present SiAnTo, an extended anonymization technique that substitutes session-participant information with matching, but nondescript, labels. This allows for SIP traces to be publicly shared, while keeping interesting traffic-session properties intact. We further demonstrate its usefulness by studying the problem of SIP NAT traversal as recorded in the anonymized traces. We analyze properties of the so-called "registration storm" incident and measure the influence of the active NAT traversal techniques on SIP traffic pattern, both only possible thanks to the preservation of session relationships inside the anonymized traces. As further benefit to the research community, we set up a public data-store with both the anonymization module and the anonymized traces available and invite other parties to share further SIP data using these open tools.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [31] Automated Classification of Network Traffic Anomalies
    Fernandes, Guilherme
    Owezarski, Philippe
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 91 - 100
  • [32] Risk Leveling of Network Traffic Anomalies
    Isaksson, Charlie
    Meng, Yu
    Dunham, Margaret H.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (06): : 258 - 265
  • [33] Detecting traffic anomalies with adaptive sampling
    Pele, Liat
    Buczko, Udi
    Galor, Oren
    Israel, Nokia
    Einziger, Gil
    SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 186 - 186
  • [34] Traffic scheduling anomalies in temporal partitions
    Almeida, Luis
    Pedreiras, Paulo
    Marau, Ricardo
    FROM MODEL-DRIVEN DESIGN TO RESOURCE MANAGEMENT FOR DISTRIBUTED EMBEDDED SYSTEMS, 2006, 225 : 95 - +
  • [35] Detection of Anomalies in Traffic Scene Surveillance
    Yadav, Shashank Singh
    Vijayakumar, Vaidehi
    Athanesious, Joshan
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 286 - 291
  • [36] A signal analysis of network traffic anomalies
    Barford, P
    Kline, J
    Plonka, D
    Ron, A
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 71 - 82
  • [37] Analyzing freeway traffic under congestion: Traffic dynamics approach
    Lovell, DJ
    Windover, JR
    JOURNAL OF TRANSPORTATION ENGINEERING, 1999, 125 (04) : 373 - 375
  • [38] Analyzing freeway traffic under congestion: Traffic dynamics approach
    Lovell, David J.
    Windover, John R.
    Journal of Transportation Engineering, 125 (04): : 373 - 375
  • [39] Analyzing business process anomalies using autoencoders
    Nolle, Timo
    Luettgen, Stefan
    Seeliger, Alexander
    Muehlhaeuser, Max
    MACHINE LEARNING, 2018, 107 (11) : 1875 - 1893
  • [40] A Flow-based Traffic Model for SIP Messages in IMS
    Xiao, Jie
    Huang, Changcheng
    Yan, James
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2665 - 2671