Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers

被引:0
|
作者
Yum, Dae Hyun
Kim, Sun Young
Moon, HoKun
Kim, Mi-Yeon
Roh, Jae-Hoon
Lee, Pil Joong
机构
来源
关键词
VoIP; SIP; DoS attack; detection system; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NON (Next Generation Network) is often called network as the general idea behind NON is that one network transports all information and services. When NON is deployed in a large scale. VoIP will eventually replace PSTN, the traditional model of voice telephony. While VoIP promises both low cost and a variety of advanced services, it may entail security vulnerabilities. Unlike PSTN, intelligence is placed at the edge and the security measures are not incorporated into the network. VoIP-specific attacks have already been introduced, of which the ringing-based DoS attack belongs. In this paper, we propose it detection system of the ringing-based DoS attacks. We model the normal traffic.: of legitimate users with the gamma distribution and then quantify the discrepancy between the normal traffic and the attack traffic with Pearson's chi-square statistic. Simulation results show that the proposed detection system can reliably detect the ringing-based DoS attacks.
引用
收藏
页码:339 / 353
页数:15
相关论文
共 50 条
  • [1] Protecting SIP Proxy Servers from Ringing-based Denial-of-Service Attacks
    Conner, William
    Nahrstedt, Klara
    ISM: 2008 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, 2008, : 340 - 347
  • [2] Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
    Jazi, Hossein Hadian
    Gonzalez, Hugo
    Stakhanova, Natalia
    Ghorbani, Ali A.
    COMPUTER NETWORKS, 2017, 121 : 25 - 36
  • [3] Neutralizing DoS Attacks on Linux Servers
    Rao, G. Rama Koteswara
    Sastri, A. Pathanjali
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 281 - 293
  • [4] CPU-based DoS attacks against SIP servers
    Luo, Ming
    Peng, Tao
    Leckie, Christopher
    2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 41 - 48
  • [5] Survey of Countering DoS/DDoS Attacks on SIP Based VoIP Networks
    Nazih, Waleed
    Elkilani, Wail S.
    Dhahri, Habib
    Abdelkader, Tamer
    ELECTRONICS, 2020, 9 (11) : 1 - 21
  • [6] Evaluating DoS Attacks Against SIP-Based VoIP Systems
    Rafique, M. Zubair
    Akbar, M. Ali
    Farooq, Muddassar
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6130 - 6135
  • [7] Detecting DoS attacks in WSN based on Clustering Technique
    Mansouri, D.
    Mokdad, L.
    Ben-othman, Jalel
    Ioualalen, M.
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 2214 - 2219
  • [8] A SIP delayed based mechanism for detecting VOIP flooding attacks
    Dassouki, Khaled
    Safa, Haidar
    Hijazi, Abbas
    El-Hajj, Wassim
    2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 588 - 593
  • [9] On the impacts of low rate DoS attacks on VoIP traffic
    Shevtekar, A.
    Stille, J.
    Ansari, N.
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 45 - 56
  • [10] Detecting DoS attacks on SIP systems
    Chen, Eric Y.
    VoIP MaSe 06: 1st IEEE Workshop on VoIP Management and Security: SECURING AND MANAGING VOIP COMMUNICATIONS, 2006, : 53 - 58