Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3640115.3640226acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

A SIP-Based Flooding Attack Detection Method in VoIP Environment

Published: 26 March 2024 Publication History

Abstract

With the continuous development of soft-switch networks and IP networks, VoIP has become the main application and medium for IP-based multimedia communication, and the security threats it faces have become an important issue. Therefore, network attack detection for VoIP services and infrastructure has become a hot topic for current IP call security protection. Based on the research of VoIP platform system in a national network project, we find that its existing network protection approaches are mainly for network layer and non-real-time application protection, and lacks the security protection capability of VoIP real-time communication based on SIP at the application layer. Thus this paper aims to improve the security of VoIP platform communication through the research of key technologies of network attack call detection based on SIP.

References

[1]
Schulzrinne, H. (1999), Converging on Internet Telephony IEEE internet Computing.
[2]
Liang Hao, Sun Jian, Xu Du. Analysis of subscriber line DoS attacks generated by legitimate signaling in telecommunication networks[J]. Journal of Information Engineering University, 2010, 11(5): 517-520.Carl G. Denial-of-service attack- detection techniques [J]. Internet Computing, IEEE, 2006, 10(1): 82-89.
[3]
Ohsita Y, Ata S, Murata M. Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically[C]. Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE.
[4]
S. Ehlert, D. Geneiatakis, and T. Magedanz, “Survey of network security systems to counter SIP-based denial-of-service attacks,” Comput. Secur., vol. 29, no. 2, pp. 225–243, Mar. 2010.
[5]
I. M. Tas, B. G. Unsalver, and S. Baktir, “A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism,”IEEE Access, vol. 8, pp. 112574–112584, 2020.
[6]
Iancu B. SER PIKE Excessive Traffic Monitoring Module[EB/OL].[2011-05-10].
[7]
I. Hussain, S. Djahel, D. Geneiatakis, F. Nait-Abdesselam, “A Lightweight Countermesaure to Cope with Flooding Attacks against Session Initiation Protocol,” Wireless and Mobile Networking Conference (WMNC), 2013 6th Joint IFIP, pp.1-5, 23-25 April 2013.
[8]
J. Stanek and L. Kencl, "SIPp-DD: SIP DDoS Flood-Attack Simulation Tool," 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Lahaina, HI, USA, 2011, pp. 1-7.
[9]
F.E. Goncalves, Building Telephony Systems with OpenSIPS 1.6, Packt Publishing Ltd, UK, 2010.
[10]
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem, “Survey of security vulnerabilities in session initiation protocol,” IEEE Commun. Surveys Tuts., vol. 8, no. 3, pp. 68–81, 3rd Quart., 2006.
[11]
“VoIP Security and Privacy Threat Taxonomy –Public Release 1.0”, VOIPSA, October 2005.
[12]
Jayashree Pougajendy, Arun Raj Kumar Parthiban, Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine, The Computer Journal, Volume 60, Issue 12, December 2017.

Cited By

View all
  • (2024)Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP StreamsTelecom10.3390/telecom50300295:3(556-587)Online publication date: 8-Jul-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICITEE '23: Proceedings of the 6th International Conference on Information Technologies and Electrical Engineering
November 2023
764 pages
ISBN:9798400708299
DOI:10.1145/3640115
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 March 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Denial of Service
  2. INVITE flood attacks
  3. Intrusion detection
  4. SIP
  5. Threshold-based detection
  6. VoIP security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICITEE 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP StreamsTelecom10.3390/telecom50300295:3(556-587)Online publication date: 8-Jul-2024

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media